General

  • Target

    Cham soc be yeu _ BabyCare_1.0.5_APKPure.apk

  • Size

    9.0MB

  • Sample

    240523-3q514sdg29

  • MD5

    bbd61723e40695b3ac74547004fb9fb8

  • SHA1

    161b5f2c5cec4ccac2723c9d43a827a89ccd84ef

  • SHA256

    c541bcd3f653530d7f75b0d57b03fe9b0288c95260284b80387bb5d157e702f3

  • SHA512

    4834f440923435ace9cb5c66e3d3bc6ebfd7a2e74e428dccd0824a7e7f34b0bd5d68438b1b45cbf2121c702aced7fe72fe5c167869d05099e65f8465c590858c

  • SSDEEP

    196608:yd2J6vH7Qd2Jbd2JDCH7Bd2J2JH7H9d2JuTH7xd2JaNH7ud2JhTH7WIVds:yd2J8H7Qd2Jbd2JuH7Bd2JGH7H9d2Jss

Malware Config

Targets

    • Target

      Cham soc be yeu _ BabyCare_1.0.5_APKPure.apk

    • Size

      9.0MB

    • MD5

      bbd61723e40695b3ac74547004fb9fb8

    • SHA1

      161b5f2c5cec4ccac2723c9d43a827a89ccd84ef

    • SHA256

      c541bcd3f653530d7f75b0d57b03fe9b0288c95260284b80387bb5d157e702f3

    • SHA512

      4834f440923435ace9cb5c66e3d3bc6ebfd7a2e74e428dccd0824a7e7f34b0bd5d68438b1b45cbf2121c702aced7fe72fe5c167869d05099e65f8465c590858c

    • SSDEEP

      196608:yd2J6vH7Qd2Jbd2JDCH7Bd2J2JH7H9d2JuTH7xd2JaNH7ud2JhTH7WIVds:yd2J8H7Qd2Jbd2JuH7Bd2JGH7H9d2Jss

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Requests dangerous framework permissions

MITRE ATT&CK Mobile v15

Tasks