General

  • Target

    Futbolplay.apk

  • Size

    19.4MB

  • Sample

    240630-rlqj3sygpd

  • MD5

    58a29c8a32ef94dc7a57d34f7ba876ef

  • SHA1

    8dfd50b7b4a6cfdf65304b54204d2b2b30d89701

  • SHA256

    b551587ee971147907be2d9f15bda2c8eb6bccdaf90ff195aaef8bece6ba983c

  • SHA512

    ba7e8d4cbed7c276c8dceef5878358bd3a717a6c4ee3213a79ef67cf1a7e3447fec8f178ef6d669085b73a48d47235ee10c21a0797fc9b717add5b1cb654fb98

  • SSDEEP

    393216:kghITr8Du4lCg6pQJu2imVZBALfxccBOdQyYomhbPRISKP32N54Oxo1:Aruu4l6iZiCYPU8r5PR/KPMTxk

Malware Config

Targets

    • Target

      Futbolplay.apk

    • Size

      19.4MB

    • MD5

      58a29c8a32ef94dc7a57d34f7ba876ef

    • SHA1

      8dfd50b7b4a6cfdf65304b54204d2b2b30d89701

    • SHA256

      b551587ee971147907be2d9f15bda2c8eb6bccdaf90ff195aaef8bece6ba983c

    • SHA512

      ba7e8d4cbed7c276c8dceef5878358bd3a717a6c4ee3213a79ef67cf1a7e3447fec8f178ef6d669085b73a48d47235ee10c21a0797fc9b717add5b1cb654fb98

    • SSDEEP

      393216:kghITr8Du4lCg6pQJu2imVZBALfxccBOdQyYomhbPRISKP32N54Oxo1:Aruu4l6iZiCYPU8r5PR/KPMTxk

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks