General

  • Target

    TV22.apk

  • Size

    3.4MB

  • Sample

    240522-pjf7hsad88

  • MD5

    e3be07aa82dde89de9489f492e4c70f8

  • SHA1

    9090c8a6e83fdeaca511313ce258e7c1315d8088

  • SHA256

    8c33dfcf286433f795b16b6364c5aa76746a2ffcd5c9b57c43770125957a9e9d

  • SHA512

    380315b6516df99a3c24e5aee82810752d85d2b48d931d10e29457de4c270996389ab51da294e53606b633a6c76a9d3350f790267d478f86619869477c52b311

  • SSDEEP

    98304:fSSMHOPKcnX6VIErOBK44IcPyqMFJrN2545haSP:f0bcAbrsKhIcsFPmPa

Malware Config

Targets

    • Target

      TV22.apk

    • Size

      3.4MB

    • MD5

      e3be07aa82dde89de9489f492e4c70f8

    • SHA1

      9090c8a6e83fdeaca511313ce258e7c1315d8088

    • SHA256

      8c33dfcf286433f795b16b6364c5aa76746a2ffcd5c9b57c43770125957a9e9d

    • SHA512

      380315b6516df99a3c24e5aee82810752d85d2b48d931d10e29457de4c270996389ab51da294e53606b633a6c76a9d3350f790267d478f86619869477c52b311

    • SSDEEP

      98304:fSSMHOPKcnX6VIErOBK44IcPyqMFJrN2545haSP:f0bcAbrsKhIcsFPmPa

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks