General

  • Target

    FanaGram_1.1.apk

  • Size

    3.0MB

  • Sample

    240523-pdzrnsgf87

  • MD5

    7142945842436542745efbb13bb2b637

  • SHA1

    dca826f4c3b020ad1559562f11703bf8a4368445

  • SHA256

    6b6da8349754085db35bcdc881c72f6318fee85fabe7ab6e9c71baf44862c99b

  • SHA512

    5ba96cb1595f090bab926edaef549a460fe941915f70f9af2d4aac294b15367192c7833a394b42337f1a42ba87f794194e3e954aca66a2ffbe6a851c5591d32a

  • SSDEEP

    98304:YHfKRc3BA0amSJoBNQD0eNdmpFKxfJc7frhEnuY:Ncxg6NI0KdgFKxlN

Malware Config

Targets

    • Target

      FanaGram_1.1.apk

    • Size

      3.0MB

    • MD5

      7142945842436542745efbb13bb2b637

    • SHA1

      dca826f4c3b020ad1559562f11703bf8a4368445

    • SHA256

      6b6da8349754085db35bcdc881c72f6318fee85fabe7ab6e9c71baf44862c99b

    • SHA512

      5ba96cb1595f090bab926edaef549a460fe941915f70f9af2d4aac294b15367192c7833a394b42337f1a42ba87f794194e3e954aca66a2ffbe6a851c5591d32a

    • SSDEEP

      98304:YHfKRc3BA0amSJoBNQD0eNdmpFKxfJc7frhEnuY:Ncxg6NI0KdgFKxlN

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks