General

  • Target

    LustyBuccaneers-0.2-Public-Android.apk

  • Size

    55.4MB

  • Sample

    240522-sv3fnsfg8w

  • MD5

    4dfde8ad9aa80d0c752021ec5c72753a

  • SHA1

    008aa3794b8efe9f989c234503c07c2dded5eb3b

  • SHA256

    6fbc441d23bf10b92d0fa3439fc0828b3e8b5c635b9b1676a22480cd49a01235

  • SHA512

    3928943d98d09a9e3132c1824603f625464de5ebbbf34593ab10d6bc87814612bcc277400047bababc888f53294c0cd14eea18c16b17c81a4e4ddd083e2a389c

  • SSDEEP

    1572864:JLrY+MHvsX6SMzUyOxwNzE+cPFSEAv3l9EobQl+0Nv:JY+Mk6SM4Ah9EAv3l6nb

Malware Config

Targets

    • Target

      LustyBuccaneers-0.2-Public-Android.apk

    • Size

      55.4MB

    • MD5

      4dfde8ad9aa80d0c752021ec5c72753a

    • SHA1

      008aa3794b8efe9f989c234503c07c2dded5eb3b

    • SHA256

      6fbc441d23bf10b92d0fa3439fc0828b3e8b5c635b9b1676a22480cd49a01235

    • SHA512

      3928943d98d09a9e3132c1824603f625464de5ebbbf34593ab10d6bc87814612bcc277400047bababc888f53294c0cd14eea18c16b17c81a4e4ddd083e2a389c

    • SSDEEP

      1572864:JLrY+MHvsX6SMzUyOxwNzE+cPFSEAv3l9EobQl+0Nv:JY+Mk6SM4Ah9EAv3l6nb

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks