General
-
Target
SHEIN-Shopping Online_10.9.1_Apkpure.apk
-
Size
68.9MB
-
Sample
240508-pjznvscb9s
-
MD5
7ece01a7c92421b304577f9cfba1e91c
-
SHA1
9f6705a5beebdc2fa5ed0b9612dd883c0a431bf5
-
SHA256
7fb7b262dad8ba535069b34568488695360c6617891de5343114bd9061b09e86
-
SHA512
bae7ac8631b0c0643078baf32442e1e966e32ac12e17783fd8f1b73c49f4543bbba0a0abfd74c6bf8fdf2cc8a405a6c0c75ce9b5578b7fec222ba857701bc3fe
-
SSDEEP
1572864:+iiRd4mLldVaQ5i0N2ujftMW8u9IcGQFO/ho9nEE7Wdr4s6dJY6WO9tUc:+fr/LaQ5qu4uXYkL7G4Y6WO92c
Static task
static1
Behavioral task
behavioral1
Sample
SHEIN-Shopping Online_10.9.1_Apkpure.apk
Resource
android-33-x64-arm64-20240508.1-en
Behavioral task
behavioral2
Sample
SHEIN-Shopping Online_10.9.1_Apkpure.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
SHEIN-Shopping Online_10.9.1_Apkpure.apk
Resource
android-x64-arm64-20240506-en
Behavioral task
behavioral4
Sample
SHEIN-Shopping Online_10.9.1_Apkpure.apk
Resource
android-33-x64-arm64-20240508.1-en
Behavioral task
behavioral5
Sample
SHEIN-Shopping Online_10.9.1_Apkpure.apk
Resource
android-x86-arm-20240506-en
Malware Config
Targets
-
-
Target
SHEIN-Shopping Online_10.9.1_Apkpure.apk
-
Size
68.9MB
-
MD5
7ece01a7c92421b304577f9cfba1e91c
-
SHA1
9f6705a5beebdc2fa5ed0b9612dd883c0a431bf5
-
SHA256
7fb7b262dad8ba535069b34568488695360c6617891de5343114bd9061b09e86
-
SHA512
bae7ac8631b0c0643078baf32442e1e966e32ac12e17783fd8f1b73c49f4543bbba0a0abfd74c6bf8fdf2cc8a405a6c0c75ce9b5578b7fec222ba857701bc3fe
-
SSDEEP
1572864:+iiRd4mLldVaQ5i0N2ujftMW8u9IcGQFO/ho9nEE7Wdr4s6dJY6WO9tUc:+fr/LaQ5qu4uXYkL7G4Y6WO92c
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads the content of photos stored on the user's device.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
6System Checks
6