General

  • Target

    412a46a3460c984a91d48ca0aa0201fbabc7c0dc0631d67fe8f1640aef6e060e.bin

  • Size

    3.5MB

  • Sample

    250415-13g4psxvc1

  • MD5

    03c7766dd30f41950a9acd451d97b8f5

  • SHA1

    68c2aa554a374d236b801bc041180890d28af0da

  • SHA256

    412a46a3460c984a91d48ca0aa0201fbabc7c0dc0631d67fe8f1640aef6e060e

  • SHA512

    0d5a772d7bd2718d2befb748365eabf017f180ffb95258ce8c2a2dbe74698059183e08d3ab8b6936a25e631bc333920bdd815560860db7158fb23bcb98c27f81

  • SSDEEP

    49152:3gW+Vs7Lx1OmZtqkNmnTSF9JAfnO3mzTkjgyejbhidyjQCnJmzvvk9jz0o/PpK:867LxJKnODSfOaQjVejbhicQZLqjQJ

Malware Config

Targets

    • Target

      412a46a3460c984a91d48ca0aa0201fbabc7c0dc0631d67fe8f1640aef6e060e.bin

    • Size

      3.5MB

    • MD5

      03c7766dd30f41950a9acd451d97b8f5

    • SHA1

      68c2aa554a374d236b801bc041180890d28af0da

    • SHA256

      412a46a3460c984a91d48ca0aa0201fbabc7c0dc0631d67fe8f1640aef6e060e

    • SHA512

      0d5a772d7bd2718d2befb748365eabf017f180ffb95258ce8c2a2dbe74698059183e08d3ab8b6936a25e631bc333920bdd815560860db7158fb23bcb98c27f81

    • SSDEEP

      49152:3gW+Vs7Lx1OmZtqkNmnTSF9JAfnO3mzTkjgyejbhidyjQCnJmzvvk9jz0o/PpK:867LxJKnODSfOaQjVejbhicQZLqjQJ

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v16

Tasks