General

  • Target

    appvs.apk

  • Size

    12.9MB

  • Sample

    240522-n1f3eaeh44

  • MD5

    1403db9b77b7ee5f5986c1f9b08a01fe

  • SHA1

    fc2bd52ccb4d78fc7dacd99c2f9fbc597d686d71

  • SHA256

    d1b170f104d677963dc02544ceca2c290d0e8565646a0425cfe83b343cbff055

  • SHA512

    2d5fb9081fded55c32845e761942452ebe040f6618950f8dfbf6496f633da3646231cea36bc56a68591c2aa544e50ebf236b224e1eb2eaf96bede6e7e92a7719

  • SSDEEP

    196608:tieSG9AceXopeI2R/pUrCscWS6yTyWR9AY3jTLaTqO7mKcZ407ErEWh9LLHlQ2FS:DSGZpER/ScWSFuCrzTNqjpQ2YX

Malware Config

Targets

    • Target

      appvs.apk

    • Size

      12.9MB

    • MD5

      1403db9b77b7ee5f5986c1f9b08a01fe

    • SHA1

      fc2bd52ccb4d78fc7dacd99c2f9fbc597d686d71

    • SHA256

      d1b170f104d677963dc02544ceca2c290d0e8565646a0425cfe83b343cbff055

    • SHA512

      2d5fb9081fded55c32845e761942452ebe040f6618950f8dfbf6496f633da3646231cea36bc56a68591c2aa544e50ebf236b224e1eb2eaf96bede6e7e92a7719

    • SSDEEP

      196608:tieSG9AceXopeI2R/pUrCscWS6yTyWR9AY3jTLaTqO7mKcZ407ErEWh9LLHlQ2FS:DSGZpER/ScWSFuCrzTNqjpQ2YX

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks