General

  • Target

    app-debug.apk

  • Size

    4.1MB

  • Sample

    240523-n8mvxsga2s

  • MD5

    2a6d587edd13ff73eb4ec9a965ad6560

  • SHA1

    d4edc2249be7687fb0db0fa43f92a8455886f86a

  • SHA256

    49a4398e42bcf45f9f9da6c851fd754dbbfc67acb07842131181f20eae34a135

  • SHA512

    0716108868a76f4dea7713f9c83c01efa5d35960d3f09e815b29c79728313917782d119ddf7cf475fd84101251370d8e996f7ed7d450c8da416e2f045be440ed

  • SSDEEP

    98304:RUYIA6B++yaINK+0agB5ov3xfyLMKhYO8Fa:RUY/c1yaIjgBgELMOYOqa

Malware Config

Targets

    • Target

      app-debug.apk

    • Size

      4.1MB

    • MD5

      2a6d587edd13ff73eb4ec9a965ad6560

    • SHA1

      d4edc2249be7687fb0db0fa43f92a8455886f86a

    • SHA256

      49a4398e42bcf45f9f9da6c851fd754dbbfc67acb07842131181f20eae34a135

    • SHA512

      0716108868a76f4dea7713f9c83c01efa5d35960d3f09e815b29c79728313917782d119ddf7cf475fd84101251370d8e996f7ed7d450c8da416e2f045be440ed

    • SSDEEP

      98304:RUYIA6B++yaINK+0agB5ov3xfyLMKhYO8Fa:RUY/c1yaIjgBgELMOYOqa

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks