General

  • Target

    DEEP_VAULT_69-v0.3.0a-release.apk

  • Size

    901.2MB

  • Sample

    240522-sqrtdaff5w

  • MD5

    fe0fe98228413dccec1a850f4afdcb06

  • SHA1

    10bb119e390ce1b08d4836e266e9ebb50026a56a

  • SHA256

    7529b98382d27c30227ed7867997939e5d6605644b93336635cd837b4080536c

  • SHA512

    cf44701673084cceefeac89143c60fa79b67d5868a5aa2021df186a35424f885c5863f6035b23cfa7355ace9470dd3958979a183ecc898059f34134af5b7f684

  • SSDEEP

    25165824:0NYHthCrhwoFc1qsPfAoFdIC/faNwwtY2ea:qsovc1XV+wwtYva

Malware Config

Targets

    • Target

      DEEP_VAULT_69-v0.3.0a-release.apk

    • Size

      901.2MB

    • MD5

      fe0fe98228413dccec1a850f4afdcb06

    • SHA1

      10bb119e390ce1b08d4836e266e9ebb50026a56a

    • SHA256

      7529b98382d27c30227ed7867997939e5d6605644b93336635cd837b4080536c

    • SHA512

      cf44701673084cceefeac89143c60fa79b67d5868a5aa2021df186a35424f885c5863f6035b23cfa7355ace9470dd3958979a183ecc898059f34134af5b7f684

    • SSDEEP

      25165824:0NYHthCrhwoFc1qsPfAoFdIC/faNwwtY2ea:qsovc1XV+wwtYva

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks