General

  • Target

    04c15411b2ce3b409bb84996ad9db477.apk

  • Size

    24.3MB

  • Sample

    240630-rrrz4asflj

  • MD5

    04c15411b2ce3b409bb84996ad9db477

  • SHA1

    731ed42d2f2387b2d83a6f981f2bfe34585b7e9c

  • SHA256

    e883daf1d0a22e4124bd8d62635680711ab775652aabb335152fb69884018959

  • SHA512

    d0cf76ae3414b68d198a0afc7d856fa27d5043b20a74ae0eafc8e632330b381b53b554146d6c7ad88b06ea9b9b9386bffc682e265dcaa4455a890dc83b865f7b

  • SSDEEP

    393216:FIWSptsKjZF31igZgw6Z6XymZQA9kSLjr4l2O7ctQLclWpPX:utptfdFFiU66XydA9Dg7ctuxPX

Malware Config

Targets

    • Target

      04c15411b2ce3b409bb84996ad9db477.apk

    • Size

      24.3MB

    • MD5

      04c15411b2ce3b409bb84996ad9db477

    • SHA1

      731ed42d2f2387b2d83a6f981f2bfe34585b7e9c

    • SHA256

      e883daf1d0a22e4124bd8d62635680711ab775652aabb335152fb69884018959

    • SHA512

      d0cf76ae3414b68d198a0afc7d856fa27d5043b20a74ae0eafc8e632330b381b53b554146d6c7ad88b06ea9b9b9386bffc682e265dcaa4455a890dc83b865f7b

    • SSDEEP

      393216:FIWSptsKjZF31igZgw6Z6XymZQA9kSLjr4l2O7ctQLclWpPX:utptfdFFiU66XydA9Dg7ctuxPX

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of SMS inbox messages.

    • Reads the content of outgoing SMS messages.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Matrix

Tasks