Resubmissions

23-05-2024 09:50

240523-lvfhkscd39 8

23-05-2024 09:36

240523-lk2m3acb43 8

General

  • Target

    base_095844.apk

  • Size

    45.3MB

  • Sample

    240523-lvfhkscd39

  • MD5

    939802cb653046411cb7b6951ad6e7ec

  • SHA1

    52f193e06c5f4991c6f402791b90f7183bac4204

  • SHA256

    bc0439149e747ff8b39325d2d3b32a5bf109297fb67540238a80c0a4475b7097

  • SHA512

    f1676b1d5b13c3f4501b62b6bdfbf023df27f57d8c5b9c7741d41bed32672abff5da645ea68a6c4bda1fe1d0d7ddd707785230619aceb08587fbafbf12679f58

  • SSDEEP

    786432:/1twDHEuONnTXrEu6KX2JRP7wis+nNXUdZO0D5eYny5rAvzE7fz2:dq4D1T7tXX+TXU9D57y9a4O

Malware Config

Targets

    • Target

      base_095844.apk

    • Size

      45.3MB

    • MD5

      939802cb653046411cb7b6951ad6e7ec

    • SHA1

      52f193e06c5f4991c6f402791b90f7183bac4204

    • SHA256

      bc0439149e747ff8b39325d2d3b32a5bf109297fb67540238a80c0a4475b7097

    • SHA512

      f1676b1d5b13c3f4501b62b6bdfbf023df27f57d8c5b9c7741d41bed32672abff5da645ea68a6c4bda1fe1d0d7ddd707785230619aceb08587fbafbf12679f58

    • SSDEEP

      786432:/1twDHEuONnTXrEu6KX2JRP7wis+nNXUdZO0D5eYny5rAvzE7fz2:dq4D1T7tXX+TXU9D57y9a4O

    • Checks if the Android device is rooted.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks