General

  • Target

    shoujiNew.apk

  • Size

    2.7MB

  • Sample

    240524-n88sdshg62

  • MD5

    7765c9d5da29a9c34bad52e4ac24e54d

  • SHA1

    6ecff6992cc0eb44fc0bbd20c97a6972a3274976

  • SHA256

    159e84d564ca562843a20d2cbb27a37fe3a3f9bb9225605d646c42badb1417e6

  • SHA512

    a15673795803fa5e7d8883dac5d1e417deaca7bcf14779584b1bd149ab528e3a33a2170012e72c10b894f46fbb7282b2995a8b4c81bd4b1dc1fd045f3cad360f

  • SSDEEP

    49152:7aixzX3Ws2k8AgukFTpxRQu7NiCB0Gl3Z7CZdlxc2XUtYgP671V63PJ7vBHTTOTv:71bb2jAgt1eu7NPJ3ZOdlxzUt61VaJhu

Malware Config

Targets

    • Target

      shoujiNew.apk

    • Size

      2.7MB

    • MD5

      7765c9d5da29a9c34bad52e4ac24e54d

    • SHA1

      6ecff6992cc0eb44fc0bbd20c97a6972a3274976

    • SHA256

      159e84d564ca562843a20d2cbb27a37fe3a3f9bb9225605d646c42badb1417e6

    • SHA512

      a15673795803fa5e7d8883dac5d1e417deaca7bcf14779584b1bd149ab528e3a33a2170012e72c10b894f46fbb7282b2995a8b4c81bd4b1dc1fd045f3cad360f

    • SSDEEP

      49152:7aixzX3Ws2k8AgukFTpxRQu7NiCB0Gl3Z7CZdlxc2XUtYgP671V63PJ7vBHTTOTv:71bb2jAgt1eu7NPJ3ZOdlxzUt61VaJhu

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks