General

  • Target

    key.apk

  • Size

    2.2MB

  • Sample

    240426-w7p8naae8v

  • MD5

    87f1b8016ab72ae6fb4f3f476be3eb59

  • SHA1

    9c918dbbc01aeec5ba1191b681a4599c2a0ce62f

  • SHA256

    0a335d05fa6a1acf1e8963ad215430c77a0e2138471ffea6256acd7f39f6c3de

  • SHA512

    99cac7ae8fc3fe4bdbb75df4ece89b5cef046d0d3160251858f533a141cef41a4c4d332c97931d6d025b3ba34b7b6c18979f89d380e355d789950903473bf55a

  • SSDEEP

    49152:PW8p/QY/bcb6QtNO4KdRoE4EpNtj8KKlQ/az7Mkkll7ev:uQV/bc2WNgRPt8KKSaz4kR

Malware Config

Targets

    • Target

      key.apk

    • Size

      2.2MB

    • MD5

      87f1b8016ab72ae6fb4f3f476be3eb59

    • SHA1

      9c918dbbc01aeec5ba1191b681a4599c2a0ce62f

    • SHA256

      0a335d05fa6a1acf1e8963ad215430c77a0e2138471ffea6256acd7f39f6c3de

    • SHA512

      99cac7ae8fc3fe4bdbb75df4ece89b5cef046d0d3160251858f533a141cef41a4c4d332c97931d6d025b3ba34b7b6c18979f89d380e355d789950903473bf55a

    • SSDEEP

      49152:PW8p/QY/bcb6QtNO4KdRoE4EpNtj8KKlQ/az7Mkkll7ev:uQV/bc2WNgRPt8KKSaz4kR

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

MITRE ATT&CK Matrix

Tasks