General

  • Target

    com.zlya.intfire-2.1.18.apk

  • Size

    12.5MB

  • Sample

    240523-ns2n5seg24

  • MD5

    fb0bb94eb3d265308a394718ec612382

  • SHA1

    50d21905090da46b9c49587e408e5e334c3c2fc8

  • SHA256

    505ab6bc8e025482c94f27f3c7c788ca9064e80ddbcb52868b5aea9e3e89dd46

  • SHA512

    66bbb59dfe3229802743e9218432c11050b0901af4ec0f238cfc32490b64813dd61ebcae0b2d7b62ffeb665b3cb4d3bf5d29f2e20f3c6278184487d8d0f4459e

  • SSDEEP

    196608:BMHaFwiStUy2b3Vyp8SThBM3R29nqtv3MB9rUmM+34D1BHMxWauf5dlucqRUf:BPS6b5EXYU8PMAXsA1xdlgE

Malware Config

Targets

    • Target

      com.zlya.intfire-2.1.18.apk

    • Size

      12.5MB

    • MD5

      fb0bb94eb3d265308a394718ec612382

    • SHA1

      50d21905090da46b9c49587e408e5e334c3c2fc8

    • SHA256

      505ab6bc8e025482c94f27f3c7c788ca9064e80ddbcb52868b5aea9e3e89dd46

    • SHA512

      66bbb59dfe3229802743e9218432c11050b0901af4ec0f238cfc32490b64813dd61ebcae0b2d7b62ffeb665b3cb4d3bf5d29f2e20f3c6278184487d8d0f4459e

    • SSDEEP

      196608:BMHaFwiStUy2b3Vyp8SThBM3R29nqtv3MB9rUmM+34D1BHMxWauf5dlucqRUf:BPS6b5EXYU8PMAXsA1xdlgE

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks