General

  • Target

    c5f405454d8c169258badeedd1c3805f154264ced0ca72759943c119d9e78c21.bin

  • Size

    2.1MB

  • Sample

    240629-12dpwsxekg

  • MD5

    7528ffc95dd3d8c73eb336c6b2b67ebe

  • SHA1

    37d2b8182354291838caf0f8d6a0b483ec774fd5

  • SHA256

    c5f405454d8c169258badeedd1c3805f154264ced0ca72759943c119d9e78c21

  • SHA512

    3247250225e6c46d8dfa11cf2edda8216631271c4c64fb87ca4690124ec3f30f12113541af45788a919d05275583d59b8d50edd06d20bdf35c3bab72df828d6f

  • SSDEEP

    49152:6Fql0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtvD:v0JNA34NPw4y8nB1gdUD

Malware Config

Targets

    • Target

      c5f405454d8c169258badeedd1c3805f154264ced0ca72759943c119d9e78c21.bin

    • Size

      2.1MB

    • MD5

      7528ffc95dd3d8c73eb336c6b2b67ebe

    • SHA1

      37d2b8182354291838caf0f8d6a0b483ec774fd5

    • SHA256

      c5f405454d8c169258badeedd1c3805f154264ced0ca72759943c119d9e78c21

    • SHA512

      3247250225e6c46d8dfa11cf2edda8216631271c4c64fb87ca4690124ec3f30f12113541af45788a919d05275583d59b8d50edd06d20bdf35c3bab72df828d6f

    • SSDEEP

      49152:6Fql0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtvD:v0JNA34NPw4y8nB1gdUD

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks