General

  • Target

    TUTOR_SMPDIRA.apk

  • Size

    253KB

  • Sample

    240523-qd1veacc68

  • MD5

    a3ef1dff45aebfaa2f29b3023a6d2c0f

  • SHA1

    3577dd08907a1abf17a8cdd128e838446ec45dbd

  • SHA256

    16a4e9e9e91ce434843af7e8717bc058037b5f671dd07254d8e5fd79680a732f

  • SHA512

    24ed9d774365d57bfd844a3506eda5915ac82d9adbbfdbcae76d03f055304b6e3042af98fab60c4eb11c5d2e1eb9fbad99960d971b0c1c72e0b8ec1f451d6e90

  • SSDEEP

    6144:fzncBJYIVZNyATVC4J1patZSS14w94vWAVyaqhX3aOiJ:IrY4bVC4J1patZSS39g3VBqp3aOiJ

Malware Config

Targets

    • Target

      TUTOR_SMPDIRA.apk

    • Size

      253KB

    • MD5

      a3ef1dff45aebfaa2f29b3023a6d2c0f

    • SHA1

      3577dd08907a1abf17a8cdd128e838446ec45dbd

    • SHA256

      16a4e9e9e91ce434843af7e8717bc058037b5f671dd07254d8e5fd79680a732f

    • SHA512

      24ed9d774365d57bfd844a3506eda5915ac82d9adbbfdbcae76d03f055304b6e3042af98fab60c4eb11c5d2e1eb9fbad99960d971b0c1c72e0b8ec1f451d6e90

    • SSDEEP

      6144:fzncBJYIVZNyATVC4J1patZSS14w94vWAVyaqhX3aOiJ:IrY4bVC4J1patZSS39g3VBqp3aOiJ

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks