General

  • Target

    SPP_SMK_1_1.0.apk

  • Size

    1.1MB

  • Sample

    240523-qaxzcabf8z

  • MD5

    914a24fc61fb7767f10558c46b608948

  • SHA1

    c75b95cab6a81a90e6314c695c7c2e3027e274a1

  • SHA256

    10e8aac2775eb5e8de7f52333efe5fab9f5454723a34757c278279d4988e05a1

  • SHA512

    b86ab92577eb10596c67d82fbb34e510b825dd549511b8dd9bb9466e1c3f2c130cc75b67b4c95cab1fa7592266bd2eb481f75a8b2378f08d2a1ff754cab4cdab

  • SSDEEP

    24576:aOUeKo0Sq9MSU7ix2x0TFFGhmRYLPOwTjYapfh:aOUeJqqiqS0OwTjx

Malware Config

Targets

    • Target

      SPP_SMK_1_1.0.apk

    • Size

      1.1MB

    • MD5

      914a24fc61fb7767f10558c46b608948

    • SHA1

      c75b95cab6a81a90e6314c695c7c2e3027e274a1

    • SHA256

      10e8aac2775eb5e8de7f52333efe5fab9f5454723a34757c278279d4988e05a1

    • SHA512

      b86ab92577eb10596c67d82fbb34e510b825dd549511b8dd9bb9466e1c3f2c130cc75b67b4c95cab1fa7592266bd2eb481f75a8b2378f08d2a1ff754cab4cdab

    • SSDEEP

      24576:aOUeKo0Sq9MSU7ix2x0TFFGhmRYLPOwTjYapfh:aOUeJqqiqS0OwTjx

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks