General

  • Target

    AAAoutline-1-11-0.apk

  • Size

    13.0MB

  • Sample

    240522-phl2daad7t

  • MD5

    5e0e5256238b69dd2e86d6564f85685b

  • SHA1

    6826c2d48d8b0f32711b2901c0966f1767cc4d43

  • SHA256

    9cdf037fde06590256c8640ebe3b0f6664f969ba23edd3665c1e129036ac3d50

  • SHA512

    00130f7aee8a740e3709fef0355c226efa23b3bfb8fed1314b4c04f54245d9e3dd8efa8c99e4b5ffe68d16ffdb85fa5712a018e11a14f84a328532ebaee29241

  • SSDEEP

    393216:obu1gdlfEzWPdGRlV9UmsKvbU5ZNXqB5HtRp:GuKiAGR9UtWwdgtX

Malware Config

Targets

    • Target

      AAAoutline-1-11-0.apk

    • Size

      13.0MB

    • MD5

      5e0e5256238b69dd2e86d6564f85685b

    • SHA1

      6826c2d48d8b0f32711b2901c0966f1767cc4d43

    • SHA256

      9cdf037fde06590256c8640ebe3b0f6664f969ba23edd3665c1e129036ac3d50

    • SHA512

      00130f7aee8a740e3709fef0355c226efa23b3bfb8fed1314b4c04f54245d9e3dd8efa8c99e4b5ffe68d16ffdb85fa5712a018e11a14f84a328532ebaee29241

    • SSDEEP

      393216:obu1gdlfEzWPdGRlV9UmsKvbU5ZNXqB5HtRp:GuKiAGR9UtWwdgtX

    • Checks if the Android device is rooted.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks