General

  • Target

    Emtiyaz .apk

  • Size

    1.4MB

  • Sample

    240522-nypxjaee4w

  • MD5

    a7aab9c22e5deb03fc6e6980fe9ae2d4

  • SHA1

    97be1d11203ab09af5d3ea95be666d61260eb9c2

  • SHA256

    961606a5c8a4551b28f860da2a8d322e2f0063fcfee07179697bf93d7d94f3a4

  • SHA512

    800b4b084ef3965592a29af968cc07e7ce0b79994ad0b0e7f9d970977ff1c5327ded6f6865553ca076c20a5a035606a15b2860c06e0a54d8b36b88156594219d

  • SSDEEP

    24576:V0m7XIv33im7SNjXgxHMSpOdxlbZwsY0vyl4HSZkGZzaRsiv4MUDa5GE:hXCd7SNjwxHMSpmYkHMZ+Rr9UDKGE

Malware Config

Targets

    • Target

      Emtiyaz .apk

    • Size

      1.4MB

    • MD5

      a7aab9c22e5deb03fc6e6980fe9ae2d4

    • SHA1

      97be1d11203ab09af5d3ea95be666d61260eb9c2

    • SHA256

      961606a5c8a4551b28f860da2a8d322e2f0063fcfee07179697bf93d7d94f3a4

    • SHA512

      800b4b084ef3965592a29af968cc07e7ce0b79994ad0b0e7f9d970977ff1c5327ded6f6865553ca076c20a5a035606a15b2860c06e0a54d8b36b88156594219d

    • SSDEEP

      24576:V0m7XIv33im7SNjXgxHMSpOdxlbZwsY0vyl4HSZkGZzaRsiv4MUDa5GE:hXCd7SNjwxHMSpmYkHMZ+Rr9UDKGE

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks