General

  • Target

    absensi smk_2_1.0.apk

  • Size

    1.1MB

  • Sample

    240523-pxln6aaf48

  • MD5

    52f2f951dca33b90ce369590c8602ba7

  • SHA1

    1d4faa53520a0853b52fab1043bfb6723a14855e

  • SHA256

    c031c95ca2f46bcb712feb8caf1d791db2910c56e4f470e2897d9424fb37be7d

  • SHA512

    d571730077976f3495a0289cae055ffd9a926c116444d10f03371b1229f83203ea3c1d1a5b29ee200b03c694e2e35ce97c75ed2918802ebe7fd3444e2e7771c6

  • SSDEEP

    24576:aP6xj1ntykPPL9FiGIsWeQONY/1FC5mxgHoOwTyYJpfX:aP01ntNj9FLWsOvOwTyC

Malware Config

Targets

    • Target

      absensi smk_2_1.0.apk

    • Size

      1.1MB

    • MD5

      52f2f951dca33b90ce369590c8602ba7

    • SHA1

      1d4faa53520a0853b52fab1043bfb6723a14855e

    • SHA256

      c031c95ca2f46bcb712feb8caf1d791db2910c56e4f470e2897d9424fb37be7d

    • SHA512

      d571730077976f3495a0289cae055ffd9a926c116444d10f03371b1229f83203ea3c1d1a5b29ee200b03c694e2e35ce97c75ed2918802ebe7fd3444e2e7771c6

    • SSDEEP

      24576:aP6xj1ntykPPL9FiGIsWeQONY/1FC5mxgHoOwTyYJpfX:aP01ntNj9FLWsOvOwTyC

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks