General

  • Target

    pda-hn.apk

  • Size

    5.0MB

  • Sample

    240523-pbf7jsgc4s

  • MD5

    0359961b37be8b40e6c3cf955c181aa0

  • SHA1

    c804ccebb65a04c17be846762f2c2c336341ba98

  • SHA256

    7c6b6d356979365474a699a5e451e0f30466fd1fa851c4c47c56e53de1e08a77

  • SHA512

    c3572dcfcd176a4bce3fafea951bc3d7a6b54dc32fdb52e482b86b451725c177e3c176499af0dbb521c139a2471ddff0e9ea61cd143d98a0841cd3283ec0de50

  • SSDEEP

    98304:2YGp0l2E+O3D43Y/4FpFwlgVFAfwvKwrQX9UfYIfEE5C7B/zlJJu+4ES+iG:sp0lZ+O8kmpFwS3vdrQX9KY79zlh

Malware Config

Targets

    • Target

      pda-hn.apk

    • Size

      5.0MB

    • MD5

      0359961b37be8b40e6c3cf955c181aa0

    • SHA1

      c804ccebb65a04c17be846762f2c2c336341ba98

    • SHA256

      7c6b6d356979365474a699a5e451e0f30466fd1fa851c4c47c56e53de1e08a77

    • SHA512

      c3572dcfcd176a4bce3fafea951bc3d7a6b54dc32fdb52e482b86b451725c177e3c176499af0dbb521c139a2471ddff0e9ea61cd143d98a0841cd3283ec0de50

    • SSDEEP

      98304:2YGp0l2E+O3D43Y/4FpFwlgVFAfwvKwrQX9UfYIfEE5C7B/zlJJu+4ES+iG:sp0lZ+O8kmpFwS3vdrQX9KY79zlh

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks