General
-
Target
ACMarket4.9.8.apk
-
Size
46.3MB
-
Sample
250508-rhrmzavj13
-
MD5
c61d37203246142a86450b93bb8509d3
-
SHA1
7942e3ffd59c27c701f0c8d466a5d0968807a45d
-
SHA256
9a694bcfcd80c4a97426496b8e5fc6b77c96d06e84dffbcb43b9681a5a332069
-
SHA512
8d61ee6ad1a8aa8f11c67c85ea50b7111da84ada64df32486fe5fac9174ec5efd37c9554f07906a11fb809c3e6aeab4b2b4f88d62c8d01c058c7b3c5a608cd28
-
SSDEEP
786432:xQf2sNIf8B0WWHpngXngWj1nbXEA6KFki+zlZ1ihOWuJ3PtMmzs+oRIVn+IORb/2:PmGzZpnMnVj1nvozlgQ3VrvnZOtn2
Static task
static1
Behavioral task
behavioral1
Sample
ACMarket4.9.8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ACMarket4.9.8.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
ACMarket4.9.8.apk
-
Size
46.3MB
-
MD5
c61d37203246142a86450b93bb8509d3
-
SHA1
7942e3ffd59c27c701f0c8d466a5d0968807a45d
-
SHA256
9a694bcfcd80c4a97426496b8e5fc6b77c96d06e84dffbcb43b9681a5a332069
-
SHA512
8d61ee6ad1a8aa8f11c67c85ea50b7111da84ada64df32486fe5fac9174ec5efd37c9554f07906a11fb809c3e6aeab4b2b4f88d62c8d01c058c7b3c5a608cd28
-
SSDEEP
786432:xQf2sNIf8B0WWHpngXngWj1nbXEA6KFki+zlZ1ihOWuJ3PtMmzs+oRIVn+IORb/2:PmGzZpnMnVj1nvozlgQ3VrvnZOtn2
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v16
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
4System Checks
4