General

  • Target

    5c43c36704c0804497fda81174602e8ef049a2159309a7ed31685f1658bfc5e5.bin

  • Size

    2.1MB

  • Sample

    240629-12cslaxekd

  • MD5

    d02c8f836d7c5d118e009afd2f5fa0b7

  • SHA1

    45572d9f76b1919b5c18ef8d406b5f758cc3f499

  • SHA256

    5c43c36704c0804497fda81174602e8ef049a2159309a7ed31685f1658bfc5e5

  • SHA512

    06e0de7f9dc5eb25b9e6a50ce1a6c5ccb06910536f4e2223adcf8acf1cdeffa1e98d7460b62949758f2c94421c5b2b9a623b6b0fda1f16902670a7e401bc2e07

  • SSDEEP

    49152:6Fql0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtv4:v0JNA34NPw4y8nB1gdU4

Malware Config

Targets

    • Target

      5c43c36704c0804497fda81174602e8ef049a2159309a7ed31685f1658bfc5e5.bin

    • Size

      2.1MB

    • MD5

      d02c8f836d7c5d118e009afd2f5fa0b7

    • SHA1

      45572d9f76b1919b5c18ef8d406b5f758cc3f499

    • SHA256

      5c43c36704c0804497fda81174602e8ef049a2159309a7ed31685f1658bfc5e5

    • SHA512

      06e0de7f9dc5eb25b9e6a50ce1a6c5ccb06910536f4e2223adcf8acf1cdeffa1e98d7460b62949758f2c94421c5b2b9a623b6b0fda1f16902670a7e401bc2e07

    • SSDEEP

      49152:6Fql0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtv4:v0JNA34NPw4y8nB1gdU4

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks