General

  • Target

    LaCuerda_9.3.apk

  • Size

    9.3MB

  • Sample

    240426-wby6pahf4z

  • MD5

    297f8118b999280e3854d3b46a810810

  • SHA1

    d3b54ee522793dc1d22e9443f69357e8c1322a66

  • SHA256

    6a28f490292da41e37399c561765cf6ea6b613e40a7cc2869160e99039f0d0fc

  • SHA512

    244459c97f22cb555a92770751e595c72964dcd89b5ee158198a3af210132b3c732097882980454f838cd0ea1b172e96700e068fabc793f7f59a431efb03124b

  • SSDEEP

    196608:BjSMTHpZroblaXBKzrUwKNzRk4+4UQu6mdTQ:BGMbrob8XBKz4nZg9Q

Malware Config

Targets

    • Target

      LaCuerda_9.3.apk

    • Size

      9.3MB

    • MD5

      297f8118b999280e3854d3b46a810810

    • SHA1

      d3b54ee522793dc1d22e9443f69357e8c1322a66

    • SHA256

      6a28f490292da41e37399c561765cf6ea6b613e40a7cc2869160e99039f0d0fc

    • SHA512

      244459c97f22cb555a92770751e595c72964dcd89b5ee158198a3af210132b3c732097882980454f838cd0ea1b172e96700e068fabc793f7f59a431efb03124b

    • SSDEEP

      196608:BjSMTHpZroblaXBKzrUwKNzRk4+4UQu6mdTQ:BGMbrob8XBKz4nZg9Q

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks