General

  • Target

    Vencord-v1.0.6.apk

  • Size

    1.2MB

  • Sample

    240425-jcj2yagg94

  • MD5

    c7a2996b321266ee65a05265ca8dfc71

  • SHA1

    8bebb56419b329f15065ae9908bfb26f59d91a2e

  • SHA256

    56fec181f0b43afa87d7cb76fbc5523ae788e5fed56356d5732a2f2b2cf6ab88

  • SHA512

    63b6c9b37a5f1734a18e5dedfc1415bfc42f815afcef342cfac6f3bfb5fcffdcea7fe26ed0abb46b18fbaf905e196092ff3c7955e7d3e2dec0cd8104dacd2721

  • SSDEEP

    24576:tdqbaAnGsPRwn4izoTu6tmkXYhafQTnHyxJhRwvarW6uMDT6nmtiS7bszq7K:tdqLGw6n4GujXKV7HyxJwvF46nmtiZqK

Malware Config

Targets

    • Target

      Vencord-v1.0.6.apk

    • Size

      1.2MB

    • MD5

      c7a2996b321266ee65a05265ca8dfc71

    • SHA1

      8bebb56419b329f15065ae9908bfb26f59d91a2e

    • SHA256

      56fec181f0b43afa87d7cb76fbc5523ae788e5fed56356d5732a2f2b2cf6ab88

    • SHA512

      63b6c9b37a5f1734a18e5dedfc1415bfc42f815afcef342cfac6f3bfb5fcffdcea7fe26ed0abb46b18fbaf905e196092ff3c7955e7d3e2dec0cd8104dacd2721

    • SSDEEP

      24576:tdqbaAnGsPRwn4izoTu6tmkXYhafQTnHyxJhRwvarW6uMDT6nmtiS7bszq7K:tdqLGw6n4GujXKV7HyxJwvF46nmtiZqK

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix

Tasks