General

  • Target

    d84f7fce3bc49b9cec3e67b3ac5bec1b48d69ebbffaf9f4a5abb5ec9c463f88d.bin

  • Size

    3.7MB

  • Sample

    250328-11xrdastdz

  • MD5

    dfc32a603eb5139167d7b68c7db05f82

  • SHA1

    d37a3d04496525e8813be96f15d9e9c00e9ce01f

  • SHA256

    d84f7fce3bc49b9cec3e67b3ac5bec1b48d69ebbffaf9f4a5abb5ec9c463f88d

  • SHA512

    5df11c82e160e91eb077856cb82b6359620ccf465e533a5e5c50bec59dd192f9f15fd6423906082d87848ee1c4e4f822dfe3edc9cee179f0f4b2e6d6eb7fe151

  • SSDEEP

    98304:kd2ZrsgEiIK/z2fHENYVCXKrtmkQcakqpD:3DIi2fkNz4tmkfakqF

Malware Config

Targets

    • Target

      d84f7fce3bc49b9cec3e67b3ac5bec1b48d69ebbffaf9f4a5abb5ec9c463f88d.bin

    • Size

      3.7MB

    • MD5

      dfc32a603eb5139167d7b68c7db05f82

    • SHA1

      d37a3d04496525e8813be96f15d9e9c00e9ce01f

    • SHA256

      d84f7fce3bc49b9cec3e67b3ac5bec1b48d69ebbffaf9f4a5abb5ec9c463f88d

    • SHA512

      5df11c82e160e91eb077856cb82b6359620ccf465e533a5e5c50bec59dd192f9f15fd6423906082d87848ee1c4e4f822dfe3edc9cee179f0f4b2e6d6eb7fe151

    • SSDEEP

      98304:kd2ZrsgEiIK/z2fHENYVCXKrtmkQcakqpD:3DIi2fkNz4tmkfakqF

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks