General

  • Target

    Loanapp.apk

  • Size

    2.3MB

  • Sample

    240507-mwfqeafd59

  • MD5

    717a3c400ae6df59fb76270944ce0874

  • SHA1

    77aa75bf9e735bb59406ca68776a8220fdfa105f

  • SHA256

    d3716cd597af0f0ae69d2afb480f5073a6d36f55b4e33346788c2d2601ef0778

  • SHA512

    5bc63f4e5b5d28be2efdda2b061712dc13a57eeb47986b10099437ea6d62596dab1ba097a36f3df5ca50684c0c25d532cda291b2f0219a9d79f8d70f1d119e57

  • SSDEEP

    49152:7i39MGrbdYdAyLFQPBEgJ+gZa7i0rOhgAWd8:7/0CAyZyw7i0rOuM

Malware Config

Targets

    • Target

      Loanapp.apk

    • Size

      2.3MB

    • MD5

      717a3c400ae6df59fb76270944ce0874

    • SHA1

      77aa75bf9e735bb59406ca68776a8220fdfa105f

    • SHA256

      d3716cd597af0f0ae69d2afb480f5073a6d36f55b4e33346788c2d2601ef0778

    • SHA512

      5bc63f4e5b5d28be2efdda2b061712dc13a57eeb47986b10099437ea6d62596dab1ba097a36f3df5ca50684c0c25d532cda291b2f0219a9d79f8d70f1d119e57

    • SSDEEP

      49152:7i39MGrbdYdAyLFQPBEgJ+gZa7i0rOhgAWd8:7/0CAyZyw7i0rOuM

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks