General

  • Target

    playcrm.apk

  • Size

    26KB

  • Sample

    240523-qeaplscc86

  • MD5

    af72ae4ed9ff292bec1f2aae4f549888

  • SHA1

    4a119d62610a2cf2521a0afe62d8b0d95d8b1e71

  • SHA256

    c171a0b022678926585bb34c30051cb2f5c8514f7fed2d688abff322ec473c60

  • SHA512

    c1b278f7d9c7b06554ae2218db903351f0c0c10b5f9bdafc6d094f43b101158fe9da4269cc5841de823d527a71fc8a59d3b95c55f0aa2357a5a04cfe96d452a7

  • SSDEEP

    768:nNiPpdK1uErFsbbgAJ+I2xOzLHYPLST36VUE:napdK1usFsNc1

Malware Config

Targets

    • Target

      playcrm.apk

    • Size

      26KB

    • MD5

      af72ae4ed9ff292bec1f2aae4f549888

    • SHA1

      4a119d62610a2cf2521a0afe62d8b0d95d8b1e71

    • SHA256

      c171a0b022678926585bb34c30051cb2f5c8514f7fed2d688abff322ec473c60

    • SHA512

      c1b278f7d9c7b06554ae2218db903351f0c0c10b5f9bdafc6d094f43b101158fe9da4269cc5841de823d527a71fc8a59d3b95c55f0aa2357a5a04cfe96d452a7

    • SSDEEP

      768:nNiPpdK1uErFsbbgAJ+I2xOzLHYPLST36VUE:napdK1usFsNc1

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks