General

  • Target

    ebede498399093d43986a6e6f29c3d0affc0fdff2e023432f2946b9f0b1d4f75.bin

  • Size

    2.0MB

  • Sample

    240629-12ft9a1crp

  • MD5

    7414ce556caa59729ebaba9caf451beb

  • SHA1

    e29aa39a4d2edcf3ec71ada077ce44a400add8be

  • SHA256

    ebede498399093d43986a6e6f29c3d0affc0fdff2e023432f2946b9f0b1d4f75

  • SHA512

    7ef825e6ab7362281abe26d8f0cf95ec7202c9ba51cc3f6e8ade54c1d8b151fc08efb80787ee2e5f76370d9832df3f499a228662ae87dfcd81300b1cc9e4c387

  • SSDEEP

    49152:JFqw0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtO:B0JNA34NPw4y8nB1gdT

Malware Config

Targets

    • Target

      ebede498399093d43986a6e6f29c3d0affc0fdff2e023432f2946b9f0b1d4f75.bin

    • Size

      2.0MB

    • MD5

      7414ce556caa59729ebaba9caf451beb

    • SHA1

      e29aa39a4d2edcf3ec71ada077ce44a400add8be

    • SHA256

      ebede498399093d43986a6e6f29c3d0affc0fdff2e023432f2946b9f0b1d4f75

    • SHA512

      7ef825e6ab7362281abe26d8f0cf95ec7202c9ba51cc3f6e8ade54c1d8b151fc08efb80787ee2e5f76370d9832df3f499a228662ae87dfcd81300b1cc9e4c387

    • SSDEEP

      49152:JFqw0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtO:B0JNA34NPw4y8nB1gdT

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks