General

  • Target

    VIMO-1.6.apk

  • Size

    12.7MB

  • Sample

    240521-gmd8bsga87

  • MD5

    6c1110a92fac2bf5e7d03f9a8b475652

  • SHA1

    948ec4b60c6973d7126f6bfc92aa15b117046fd2

  • SHA256

    4148fa7c33eb8322f83dae8668a3d4461fade2541181ab0aaed93c2caac22008

  • SHA512

    02f18168f5e36b66f8c0816b724c4cb02e3a19a609f02a308ca1a1d388a09f9ea836beebf3cc5f6a7f4a6028121fe203d1095d5bb7af1bdc788ff54be085522a

  • SSDEEP

    393216:MXTvgcCfgc7tR4SRnHh52OF483NqxGklKD/VE6:Ma4eHh5bXsG6KDNb

Malware Config

Targets

    • Target

      VIMO-1.6.apk

    • Size

      12.7MB

    • MD5

      6c1110a92fac2bf5e7d03f9a8b475652

    • SHA1

      948ec4b60c6973d7126f6bfc92aa15b117046fd2

    • SHA256

      4148fa7c33eb8322f83dae8668a3d4461fade2541181ab0aaed93c2caac22008

    • SHA512

      02f18168f5e36b66f8c0816b724c4cb02e3a19a609f02a308ca1a1d388a09f9ea836beebf3cc5f6a7f4a6028121fe203d1095d5bb7af1bdc788ff54be085522a

    • SSDEEP

      393216:MXTvgcCfgc7tR4SRnHh52OF483NqxGklKD/VE6:Ma4eHh5bXsG6KDNb

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks