General

  • Target

    09e3ce20bce52705b8a881dab468844bf408dc31e5f039662851bc3df1e1364f.bin

  • Size

    3.7MB

  • Sample

    250328-12xsrsstgt

  • MD5

    36990bdc96888e3208cf66f48a0753c0

  • SHA1

    7e9edb033481a067233a98ec5d44cc6865b50d40

  • SHA256

    09e3ce20bce52705b8a881dab468844bf408dc31e5f039662851bc3df1e1364f

  • SHA512

    6158e7c06a34c7e120fb8793abe542cee65fa602cce40d7cb4e39b5f37d040277214b95427b7e529cd2e6371651124a57a48de48499190d3284a45b4cba4ea6a

  • SSDEEP

    98304:bd2ZrsgEiIK/z2fHENYVCXKrtmkQcaWqpL:QDIi2fkNz4tmkfaWqx

Malware Config

Targets

    • Target

      09e3ce20bce52705b8a881dab468844bf408dc31e5f039662851bc3df1e1364f.bin

    • Size

      3.7MB

    • MD5

      36990bdc96888e3208cf66f48a0753c0

    • SHA1

      7e9edb033481a067233a98ec5d44cc6865b50d40

    • SHA256

      09e3ce20bce52705b8a881dab468844bf408dc31e5f039662851bc3df1e1364f

    • SHA512

      6158e7c06a34c7e120fb8793abe542cee65fa602cce40d7cb4e39b5f37d040277214b95427b7e529cd2e6371651124a57a48de48499190d3284a45b4cba4ea6a

    • SSDEEP

      98304:bd2ZrsgEiIK/z2fHENYVCXKrtmkQcaWqpL:QDIi2fkNz4tmkfaWqx

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks