General

  • Target

    com.dawai.intfire.apk

  • Size

    12.9MB

  • Sample

    240523-pt5mvsab5x

  • MD5

    19345dc851a4737b9d253709f83f151b

  • SHA1

    7ccc75926429a26f91b551835c8e3e651c840dc5

  • SHA256

    d14bb3a40121e3a151f3c8a1fa57f606bcc34fb7ccc02b50d8b2263020bdedef

  • SHA512

    0555c42a175827b65c93aaf18dc4f65eb84d567e02a930a44446c7fff6f0d296f925839550e1e243e967dafa9f30ab34447076d5110be3e7bc7164f05055ce22

  • SSDEEP

    196608:xibHsnJz5FS6nPWE6N3q1HMiZ7ElDv3QvpB7I9rUmM+kmF3EbDT1kLX5L9k5zaZI:xiOb46nhT5fZ7ccvp+3IDTONRgaC

Malware Config

Targets

    • Target

      com.dawai.intfire.apk

    • Size

      12.9MB

    • MD5

      19345dc851a4737b9d253709f83f151b

    • SHA1

      7ccc75926429a26f91b551835c8e3e651c840dc5

    • SHA256

      d14bb3a40121e3a151f3c8a1fa57f606bcc34fb7ccc02b50d8b2263020bdedef

    • SHA512

      0555c42a175827b65c93aaf18dc4f65eb84d567e02a930a44446c7fff6f0d296f925839550e1e243e967dafa9f30ab34447076d5110be3e7bc7164f05055ce22

    • SSDEEP

      196608:xibHsnJz5FS6nPWE6N3q1HMiZ7ElDv3QvpB7I9rUmM+kmF3EbDT1kLX5L9k5zaZI:xiOb46nhT5fZ7ccvp+3IDTONRgaC

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks