General

  • Target

    appv2.apk

  • Size

    12.9MB

  • Sample

    240522-nzsd2seg4t

  • MD5

    f19d6aab290cfdbe96c98f155dd500d1

  • SHA1

    359eddc38b948f9e22deda7091d207c76f5e8dfb

  • SHA256

    36271785dcdc7a894b6f92005d3de04168bc3b431de0f7c38f02a3173de7dead

  • SHA512

    c757218349484b591207fe1be24469ef45016365b448e89d39df015d064bb5ff51568040150d0110544e5b30ba78e4aa4a0c63f340f4772833bb57a07b5d532a

  • SSDEEP

    196608:tieSG9AceXopeI2R/pUxCscWS6y2yWR9AY3jTLaTqO7mKcZ407ErEWh9LLH5QSXV:DSGZpER/4cWSFhCrzTNqjtQSKo

Malware Config

Targets

    • Target

      appv2.apk

    • Size

      12.9MB

    • MD5

      f19d6aab290cfdbe96c98f155dd500d1

    • SHA1

      359eddc38b948f9e22deda7091d207c76f5e8dfb

    • SHA256

      36271785dcdc7a894b6f92005d3de04168bc3b431de0f7c38f02a3173de7dead

    • SHA512

      c757218349484b591207fe1be24469ef45016365b448e89d39df015d064bb5ff51568040150d0110544e5b30ba78e4aa4a0c63f340f4772833bb57a07b5d532a

    • SSDEEP

      196608:tieSG9AceXopeI2R/pUxCscWS6y2yWR9AY3jTLaTqO7mKcZ407ErEWh9LLH5QSXV:DSGZpER/4cWSFhCrzTNqjtQSKo

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks