General

  • Target

    t.apk

  • Size

    4.9MB

  • Sample

    240523-qflhhacc7z

  • MD5

    26d318f30559a2c8694a3f82d82fbc21

  • SHA1

    b27d33619f5901f5c12280152072f105213c6e22

  • SHA256

    f842df686523043f8aa509a90fc1110dabfe9b4d1cd1340f198b12f88ebcaa70

  • SHA512

    e656ca66daecdae98ad95e9c815926af180d1bdcfce19a3698d7ab48856e2f81ff468ba6c94052ce76162999dba4a4990de614300c27508eb67514976dfe62b1

  • SSDEEP

    98304:MyqqD32BBTN04Sm2WC8iKKR48V3zpoJYDYC9Q31s+A54OKX/8Hw1Fvma7z4ofrXi:MGr2FlSm2/KE48VSe901s+ALM/8HwLvM

Malware Config

Targets

    • Target

      t.apk

    • Size

      4.9MB

    • MD5

      26d318f30559a2c8694a3f82d82fbc21

    • SHA1

      b27d33619f5901f5c12280152072f105213c6e22

    • SHA256

      f842df686523043f8aa509a90fc1110dabfe9b4d1cd1340f198b12f88ebcaa70

    • SHA512

      e656ca66daecdae98ad95e9c815926af180d1bdcfce19a3698d7ab48856e2f81ff468ba6c94052ce76162999dba4a4990de614300c27508eb67514976dfe62b1

    • SSDEEP

      98304:MyqqD32BBTN04Sm2WC8iKKR48V3zpoJYDYC9Q31s+A54OKX/8Hw1Fvma7z4ofrXi:MGr2FlSm2/KE48VSe901s+ALM/8HwLvM

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks