General

  • Target

    pokedialer-2-0-8.apk

  • Size

    11.2MB

  • Sample

    250328-smrdfaxxgt

  • MD5

    f30282fe545913561c7146ec997e157f

  • SHA1

    700ef1ffde81cfb7b3fbc1433c267d9464928802

  • SHA256

    1b012fb5f2c973f9c2cd5e6614be43fb88b60c63494b897cdf54d3ff8baa4469

  • SHA512

    2b65ab4037f8dd4355089d903764c387c03917ffec94fcbbaab5dfb50af0e561c92e4f65f2db7d351497e6655a32413dc3f4fb6c28aa6c0bd0ede11da08b0cb4

  • SSDEEP

    196608:O8y6/qDN/HJ91+EeLyFL4bj4sKFKmwI7CI8bx3pvWBnk9q6vN5ntsQlltojAVq:ORrZfJX+ELIJmZCpNlWJk5l7lltojAY

Malware Config

Targets

    • Target

      pokedialer-2-0-8.apk

    • Size

      11.2MB

    • MD5

      f30282fe545913561c7146ec997e157f

    • SHA1

      700ef1ffde81cfb7b3fbc1433c267d9464928802

    • SHA256

      1b012fb5f2c973f9c2cd5e6614be43fb88b60c63494b897cdf54d3ff8baa4469

    • SHA512

      2b65ab4037f8dd4355089d903764c387c03917ffec94fcbbaab5dfb50af0e561c92e4f65f2db7d351497e6655a32413dc3f4fb6c28aa6c0bd0ede11da08b0cb4

    • SSDEEP

      196608:O8y6/qDN/HJ91+EeLyFL4bj4sKFKmwI7CI8bx3pvWBnk9q6vN5ntsQlltojAVq:ORrZfJX+ELIJmZCpNlWJk5l7lltojAY

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the call log.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks