General

  • Target

    1.apk

  • Size

    14.4MB

  • Sample

    240522-ntyc4sdd67

  • MD5

    80289007bbf0242db24a4ac8fbd187fa

  • SHA1

    02f8a743055be053db0902edc0eb078e14c2d29f

  • SHA256

    e88b4c3bf31f071f41ad60aba3a28f012694f10fa2fa6fa01cdf6036e70b8d5e

  • SHA512

    6fd18714bbcb8594def0799cfb865149ec4fca56ec6bc8fd39bc6448bb14f3708e76e2f63b304fd0864969a0ebead2f9256d8f9c4b8647769c57d1043946fbf5

  • SSDEEP

    393216:0DLZHLzeSt/iXJAp8xMIqptyqaZW5HjQQKWlc:0RHLzeCip6tnaZW5DQRWlc

Malware Config

Targets

    • Target

      1.apk

    • Size

      14.4MB

    • MD5

      80289007bbf0242db24a4ac8fbd187fa

    • SHA1

      02f8a743055be053db0902edc0eb078e14c2d29f

    • SHA256

      e88b4c3bf31f071f41ad60aba3a28f012694f10fa2fa6fa01cdf6036e70b8d5e

    • SHA512

      6fd18714bbcb8594def0799cfb865149ec4fca56ec6bc8fd39bc6448bb14f3708e76e2f63b304fd0864969a0ebead2f9256d8f9c4b8647769c57d1043946fbf5

    • SSDEEP

      393216:0DLZHLzeSt/iXJAp8xMIqptyqaZW5HjQQKWlc:0RHLzeCip6tnaZW5DQRWlc

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks