General

  • Target

    swccapp.apk

  • Size

    7.7MB

  • Sample

    240521-gdqvrsed7y

  • MD5

    44ad31472b9e90d30bbf32eeda5aadfc

  • SHA1

    618d2a7a6afb4fed48544a242415cd2fe59ecb8f

  • SHA256

    2146bfbd633871467b0dc3e27ec905e12d31b050b0fde30f004b36a2dfc985bc

  • SHA512

    5c84db2015aeaca8c4c37ad7bfe3e7e01fc20f5b7389a259db754bb92bee9b47892ddbad8604c85b889865b2c2150c61be78e59e11dffc95856ab6b21186db63

  • SSDEEP

    196608:GBoUYft5GMqoOcHaYEmyxx7gVZPYD0zGmULMdQ:Godf+KOktyf1JLt

Malware Config

Targets

    • Target

      swccapp.apk

    • Size

      7.7MB

    • MD5

      44ad31472b9e90d30bbf32eeda5aadfc

    • SHA1

      618d2a7a6afb4fed48544a242415cd2fe59ecb8f

    • SHA256

      2146bfbd633871467b0dc3e27ec905e12d31b050b0fde30f004b36a2dfc985bc

    • SHA512

      5c84db2015aeaca8c4c37ad7bfe3e7e01fc20f5b7389a259db754bb92bee9b47892ddbad8604c85b889865b2c2150c61be78e59e11dffc95856ab6b21186db63

    • SSDEEP

      196608:GBoUYft5GMqoOcHaYEmyxx7gVZPYD0zGmULMdQ:Godf+KOktyf1JLt

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks