General

  • Target

    0a22d698c31383a54c4d7c253f097e9c30b03b6384cae64c5f0fe6286057664e.bin

  • Size

    2.0MB

  • Sample

    240701-1y283sseld

  • MD5

    061556a42c86b2a313f4cb433dc3e83b

  • SHA1

    600e08e253035c47df3e39b60e0e37ddd6889ae4

  • SHA256

    0a22d698c31383a54c4d7c253f097e9c30b03b6384cae64c5f0fe6286057664e

  • SHA512

    85b095b552be4c20773e09f8f67d5683374e795b83fab1285b28c45d2c790595e688d6b19b3acb8b5ff9f3d3a13a980ee7fb70199e852fa45d7b10f84a63d9b4

  • SSDEEP

    49152:JFqw0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtz:B0JNA34NPw4y8nB1gdu

Malware Config

Targets

    • Target

      0a22d698c31383a54c4d7c253f097e9c30b03b6384cae64c5f0fe6286057664e.bin

    • Size

      2.0MB

    • MD5

      061556a42c86b2a313f4cb433dc3e83b

    • SHA1

      600e08e253035c47df3e39b60e0e37ddd6889ae4

    • SHA256

      0a22d698c31383a54c4d7c253f097e9c30b03b6384cae64c5f0fe6286057664e

    • SHA512

      85b095b552be4c20773e09f8f67d5683374e795b83fab1285b28c45d2c790595e688d6b19b3acb8b5ff9f3d3a13a980ee7fb70199e852fa45d7b10f84a63d9b4

    • SSDEEP

      49152:JFqw0C3GNA34Nbh/4ezw4/q88QhmXdFMT1at3H95pFYtz:B0JNA34NPw4y8nB1gdu

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks