Resubmissions

01-07-2024 09:10

240701-k5czrsshmh 8

01-07-2024 09:04

240701-k12gkasfrb 8

01-07-2024 09:01

240701-ky6cqssfka 6

General

  • Target

    Fibonas_676_90b431e8-7ebf-4f87-8c88-c6ae179f4dd8_v1.6.20.apk

  • Size

    67.4MB

  • Sample

    240701-k12gkasfrb

  • MD5

    2a6334f07c19cb964b640c04fcc475e4

  • SHA1

    30a57cb37ac64268980eb4316080076c2ed685c7

  • SHA256

    5917a3aae63270bee1f38a34108132266bc9da5c12b2ffdac2e690efdd0c2bf1

  • SHA512

    cfdc9ed8ce42703f8cfe27a29f0fc1a6cc5d69e256b1982d4510ba350e688f97ba8c8c61ad6a8a0748a4ca59eabc3a80f6a1fa467ad5376f32cfb04d42ebe01b

  • SSDEEP

    786432:gpG7NbNkONtWikrQBwpb2nfeNHDjdheKH7nZap3CVCst/lnW7J89wwghKatWHqxK:g6NztsQBw7tXCh1wgdJceH4gbZwH

Malware Config

Targets

    • Target

      Fibonas_676_90b431e8-7ebf-4f87-8c88-c6ae179f4dd8_v1.6.20.apk

    • Size

      67.4MB

    • MD5

      2a6334f07c19cb964b640c04fcc475e4

    • SHA1

      30a57cb37ac64268980eb4316080076c2ed685c7

    • SHA256

      5917a3aae63270bee1f38a34108132266bc9da5c12b2ffdac2e690efdd0c2bf1

    • SHA512

      cfdc9ed8ce42703f8cfe27a29f0fc1a6cc5d69e256b1982d4510ba350e688f97ba8c8c61ad6a8a0748a4ca59eabc3a80f6a1fa467ad5376f32cfb04d42ebe01b

    • SSDEEP

      786432:gpG7NbNkONtWikrQBwpb2nfeNHDjdheKH7nZap3CVCst/lnW7J89wwghKatWHqxK:g6NztsQBw7tXCh1wgdJceH4gbZwH

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks