General

  • Target

    Blindstory_for_Instagram-2.1.16.apk

  • Size

    7.5MB

  • Sample

    240701-1dkhja1cne

  • MD5

    6c99a18836f9cc407e3eb8309f738772

  • SHA1

    706adfa9ecff21ea8d3f6290d65de598ce88bdc9

  • SHA256

    feec23e673addca7ea7cd610e7955627910a7528790b2ca7d43a1efb55d35a07

  • SHA512

    a813d52d320ea34054dd745d2933ab8bdf27fceb40596d93ea5d99f5f0551c8813319db1c93c66c35a25cc740817c4a9da1f387545e55d99a80af7bf581c5467

  • SSDEEP

    196608:4/erRDgGEBY+EWPFcPC/Nj/j7FJzoxTnCJHBX0O:4mrVEkPUrYhnCJHBXB

Malware Config

Targets

    • Target

      Blindstory_for_Instagram-2.1.16.apk

    • Size

      7.5MB

    • MD5

      6c99a18836f9cc407e3eb8309f738772

    • SHA1

      706adfa9ecff21ea8d3f6290d65de598ce88bdc9

    • SHA256

      feec23e673addca7ea7cd610e7955627910a7528790b2ca7d43a1efb55d35a07

    • SHA512

      a813d52d320ea34054dd745d2933ab8bdf27fceb40596d93ea5d99f5f0551c8813319db1c93c66c35a25cc740817c4a9da1f387545e55d99a80af7bf581c5467

    • SSDEEP

      196608:4/erRDgGEBY+EWPFcPC/Nj/j7FJzoxTnCJHBX0O:4mrVEkPUrYhnCJHBXB

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks