General

  • Target

    NPC S School Chapter all you can F.apk

  • Size

    31.7MB

  • Sample

    240522-s42kqsgb43

  • MD5

    6538096828aa34de23462951f8941bd4

  • SHA1

    b224b5bbd14f9840e60b520675e07fd34b629822

  • SHA256

    7df96467c4d47cadea45542432e4cafb80aceff0a93bd90efbd5c18191323f7b

  • SHA512

    73181d33fd2ea87888838f86405d242e77763fbf3ce1b0ea6f0489614295fe6df27b748df67f1c672033baaf2273e2dac127f7a1231d0b9aed97ffe9ff07e3d9

  • SSDEEP

    786432:R3DxGAxPy2dwK3d9y+IVVZ1jvlps3GgjDyhgwqIT6WVT9vKW:RTxB0K3OVVZ1jvAGc6g47VT9vv

Malware Config

Targets

    • Target

      NPC S School Chapter all you can F.apk

    • Size

      31.7MB

    • MD5

      6538096828aa34de23462951f8941bd4

    • SHA1

      b224b5bbd14f9840e60b520675e07fd34b629822

    • SHA256

      7df96467c4d47cadea45542432e4cafb80aceff0a93bd90efbd5c18191323f7b

    • SHA512

      73181d33fd2ea87888838f86405d242e77763fbf3ce1b0ea6f0489614295fe6df27b748df67f1c672033baaf2273e2dac127f7a1231d0b9aed97ffe9ff07e3d9

    • SSDEEP

      786432:R3DxGAxPy2dwK3d9y+IVVZ1jvlps3GgjDyhgwqIT6WVT9vKW:RTxB0K3OVVZ1jvAGc6g47VT9vv

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks