General

  • Target

    prog.apk

  • Size

    20.5MB

  • Sample

    240301-cc9t2aad64

  • MD5

    3306391950192abec178615e5dfcee53

  • SHA1

    73d7d97fa7943be3fb1a09021579de25f101d6f8

  • SHA256

    4b38232db89ffc202f41fee493a84b056f1115339439efb6635d170e05bfa85b

  • SHA512

    67e19e7dbaec8d102cd41a693a86203bf1b2ca4147d29b5d4d5b30e24969d937c1e3ef67f88ad1ecfee75fdd80ef5849ce56d10d55f9abec58f6933063932ddb

  • SSDEEP

    393216:oyNMhsJA35z7A79L+oIv1mbgafiubcbZLbhT9i/zVN2I+TX296KpPbNiRSKcsgJk:jM6JA35z7c5KtmbBffcFLbi/zVN2Ikm4

Malware Config

Extracted

Family

andrmonitor

C2

https://anmon.name/mch.html

Targets

    • Target

      prog.apk

    • Size

      20.5MB

    • MD5

      3306391950192abec178615e5dfcee53

    • SHA1

      73d7d97fa7943be3fb1a09021579de25f101d6f8

    • SHA256

      4b38232db89ffc202f41fee493a84b056f1115339439efb6635d170e05bfa85b

    • SHA512

      67e19e7dbaec8d102cd41a693a86203bf1b2ca4147d29b5d4d5b30e24969d937c1e3ef67f88ad1ecfee75fdd80ef5849ce56d10d55f9abec58f6933063932ddb

    • SSDEEP

      393216:oyNMhsJA35z7A79L+oIv1mbgafiubcbZLbhT9i/zVN2I+TX296KpPbNiRSKcsgJk:jM6JA35z7c5KtmbBffcFLbi/zVN2Ikm4

    • AndrMonitor

      AndrMonitor is an Android stalkerware.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

    • Requests dangerous framework permissions

MITRE ATT&CK Matrix

Tasks