General

  • Target

    5246c3b5d4ce006bb4295eebf3f836693623ef7769c3f0aab219b2c0902a9d1a

  • Size

    15.8MB

  • Sample

    240701-cnl74swfnl

  • MD5

    2c8debabd9af9be1f05ba4433bbd1b30

  • SHA1

    eb9a28783246a2a324081685f5746854fded8355

  • SHA256

    5246c3b5d4ce006bb4295eebf3f836693623ef7769c3f0aab219b2c0902a9d1a

  • SHA512

    fdb873cf10544edae03eee9b0193622f40579a1beb108560728b176d25618b67f7d5bb52eda8f119e68c72842b9ac4f6bef095ef09b99da89670c41a0948d994

  • SSDEEP

    393216:MdUVU8y/rtX1XuK+5QRiGSQOLGLuRgZW7v7WxwezZ:MCVUlNY5QAhZgMqued

Malware Config

Targets

    • Target

      5246c3b5d4ce006bb4295eebf3f836693623ef7769c3f0aab219b2c0902a9d1a

    • Size

      15.8MB

    • MD5

      2c8debabd9af9be1f05ba4433bbd1b30

    • SHA1

      eb9a28783246a2a324081685f5746854fded8355

    • SHA256

      5246c3b5d4ce006bb4295eebf3f836693623ef7769c3f0aab219b2c0902a9d1a

    • SHA512

      fdb873cf10544edae03eee9b0193622f40579a1beb108560728b176d25618b67f7d5bb52eda8f119e68c72842b9ac4f6bef095ef09b99da89670c41a0948d994

    • SSDEEP

      393216:MdUVU8y/rtX1XuK+5QRiGSQOLGLuRgZW7v7WxwezZ:MCVUlNY5QAhZgMqued

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks