General

  • Target

    drawer.apk

  • Size

    3.5MB

  • Sample

    240522-n5g59sfg7t

  • MD5

    fbab3b301d93a9eb4c62f0802beba473

  • SHA1

    9e9dfecf608d27c747fafcdbf5e5ca61774c199c

  • SHA256

    a321ebaa92dce5836cb0fce6743f4ff5b2b177350d74fd6822da82baaa3c8a92

  • SHA512

    1474b541fac318f67cc2c17288eaa4e0f0e0ab8e998b79998cac7bc97ae79cc9116d4d8c8bbcc6dac1625179de124347f3fc63217c701988ff8a688690ce7fae

  • SSDEEP

    98304:q41/9CTd3wz/yw3evtmVQCHgXyBx7BEIBYrmlnd:q456dAz53amVQCHH7BJYGd

Malware Config

Targets

    • Target

      drawer.apk

    • Size

      3.5MB

    • MD5

      fbab3b301d93a9eb4c62f0802beba473

    • SHA1

      9e9dfecf608d27c747fafcdbf5e5ca61774c199c

    • SHA256

      a321ebaa92dce5836cb0fce6743f4ff5b2b177350d74fd6822da82baaa3c8a92

    • SHA512

      1474b541fac318f67cc2c17288eaa4e0f0e0ab8e998b79998cac7bc97ae79cc9116d4d8c8bbcc6dac1625179de124347f3fc63217c701988ff8a688690ce7fae

    • SSDEEP

      98304:q41/9CTd3wz/yw3evtmVQCHgXyBx7BEIBYrmlnd:q456dAz53amVQCHH7BJYGd

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks