General

  • Target

    jetz.apk

  • Size

    1.1MB

  • Sample

    240523-qdgfrsca5z

  • MD5

    82375a76ee45a1b02ca3dc9a5c88ab9f

  • SHA1

    2115e361fb82912daff18892f00ca1fdd9ae6929

  • SHA256

    2fbacfca96da0bc3b89cbf4bc494e010a8fa780bbe235abbed97344cc8c96434

  • SHA512

    e869600ed17ede6f2814830e36d4a576a9c3da5c46d6b4fe84e62a2fa9eb3f029618c46248e7dc4a95de7375ccdc29bf010c6adae19470e51868511bd501c226

  • SSDEEP

    24576:87djr0BQ2LyYRNKrm1X9u7wnnK0d8on/Zm+zqSNZxV:60BQ2+YDKo9uwluczd1V

Malware Config

Targets

    • Target

      jetz.apk

    • Size

      1.1MB

    • MD5

      82375a76ee45a1b02ca3dc9a5c88ab9f

    • SHA1

      2115e361fb82912daff18892f00ca1fdd9ae6929

    • SHA256

      2fbacfca96da0bc3b89cbf4bc494e010a8fa780bbe235abbed97344cc8c96434

    • SHA512

      e869600ed17ede6f2814830e36d4a576a9c3da5c46d6b4fe84e62a2fa9eb3f029618c46248e7dc4a95de7375ccdc29bf010c6adae19470e51868511bd501c226

    • SSDEEP

      24576:87djr0BQ2LyYRNKrm1X9u7wnnK0d8on/Zm+zqSNZxV:60BQ2+YDKo9uwluczd1V

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks