General

  • Target

    8e2f70ff04bc9adef1a591fc49daa6f6b035dc24491d1176c0e66da77824460e.bin

  • Size

    2.1MB

  • Sample

    240629-11krta1cmq

  • MD5

    4cb82880f878e48dce90131abf791eed

  • SHA1

    3907c3d739014de8a7be87ac13a5b45e7b091759

  • SHA256

    8e2f70ff04bc9adef1a591fc49daa6f6b035dc24491d1176c0e66da77824460e

  • SHA512

    c4b0735f49e5dd8e59f7d9a5feeef5b0d052f803cb9c9fdafa440ec085cbf99dc14e8f890e20732f763b1ec306f8ce729417f55fc1ea0fb87c749d6fc4a9b8a4

  • SSDEEP

    49152:IFq00C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H65pFYtv9:Y0JNA34NPw4y8nB1gEU9

Malware Config

Targets

    • Target

      8e2f70ff04bc9adef1a591fc49daa6f6b035dc24491d1176c0e66da77824460e.bin

    • Size

      2.1MB

    • MD5

      4cb82880f878e48dce90131abf791eed

    • SHA1

      3907c3d739014de8a7be87ac13a5b45e7b091759

    • SHA256

      8e2f70ff04bc9adef1a591fc49daa6f6b035dc24491d1176c0e66da77824460e

    • SHA512

      c4b0735f49e5dd8e59f7d9a5feeef5b0d052f803cb9c9fdafa440ec085cbf99dc14e8f890e20732f763b1ec306f8ce729417f55fc1ea0fb87c749d6fc4a9b8a4

    • SSDEEP

      49152:IFq00C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H65pFYtv9:Y0JNA34NPw4y8nB1gEU9

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks