General

  • Target

    com.yufu.intfire.apk

  • Size

    8.4MB

  • Sample

    240522-n9jvnagf47

  • MD5

    9df722417f9ae7ce8800c934af9c3596

  • SHA1

    7eddf88d4b2cfc9eaf4e98b3d1aa43b572b307d5

  • SHA256

    b2e3fee4ef3d48a7d8d53e4ed226efa70d4341c73d4b91b9194cbd01e98367cb

  • SHA512

    4e46b51faba21f9040969d787c7639dcca978f07d8be61b37b085ee365a870ff1ac4f0b64561bf5ef33a8265dd74e54e58c49d26dfeaa333f2a581a674a145d3

  • SSDEEP

    196608:JMHbEFwiStUy2b3Vyp8g9rUmM+ITVgtoe+uVxKSVdBzpT:JWYS6b5Je+SNrV

Malware Config

Targets

    • Target

      com.yufu.intfire.apk

    • Size

      8.4MB

    • MD5

      9df722417f9ae7ce8800c934af9c3596

    • SHA1

      7eddf88d4b2cfc9eaf4e98b3d1aa43b572b307d5

    • SHA256

      b2e3fee4ef3d48a7d8d53e4ed226efa70d4341c73d4b91b9194cbd01e98367cb

    • SHA512

      4e46b51faba21f9040969d787c7639dcca978f07d8be61b37b085ee365a870ff1ac4f0b64561bf5ef33a8265dd74e54e58c49d26dfeaa333f2a581a674a145d3

    • SSDEEP

      196608:JMHbEFwiStUy2b3Vyp8g9rUmM+ITVgtoe+uVxKSVdBzpT:JWYS6b5Je+SNrV

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks