General

  • Target

    com-procreate-pro_paint-2.apk

  • Size

    30.3MB

  • Sample

    250403-yqfn1as1b1

  • MD5

    8d426e98c5954302cd674cf424b1f1f9

  • SHA1

    b765963a0241b203c0a7e374e9aea7acf768d2b7

  • SHA256

    07d7f96a455dc8fed93f17eda927b6ed6bc79bcaa651a65d02a782af6cf9c0c2

  • SHA512

    acf97c9c3e901c1f337d76960d7bc651085b2ba3188bd279ffd312b42102ed8ec78059bfd968aef3ad538f0e4548a66b05ad2f2b5affc3fb1b95dd383efe86ab

  • SSDEEP

    786432:zDhvOp2o6UOKJhcJ6+v4IQzfGe+n/Zfa87PQF/FVb:FOQoWkQ64TQjGxn/Zy8TQF/FVb

Malware Config

Targets

    • Target

      com-procreate-pro_paint-2.apk

    • Size

      30.3MB

    • MD5

      8d426e98c5954302cd674cf424b1f1f9

    • SHA1

      b765963a0241b203c0a7e374e9aea7acf768d2b7

    • SHA256

      07d7f96a455dc8fed93f17eda927b6ed6bc79bcaa651a65d02a782af6cf9c0c2

    • SHA512

      acf97c9c3e901c1f337d76960d7bc651085b2ba3188bd279ffd312b42102ed8ec78059bfd968aef3ad538f0e4548a66b05ad2f2b5affc3fb1b95dd383efe86ab

    • SSDEEP

      786432:zDhvOp2o6UOKJhcJ6+v4IQzfGe+n/Zfa87PQF/FVb:FOQoWkQ64TQjGxn/Zy8TQF/FVb

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks