General

  • Target

    inema-capdat.apk

  • Size

    7.4MB

  • Sample

    240524-n8c1qahd8v

  • MD5

    25388da43f0aa24e0734f09b8bc81c7a

  • SHA1

    a28c26e99cbd859437a6a409d52ee380941698db

  • SHA256

    508ee78e646bc8b8edf387e80c8d709c649901536c8444c9a2bb199cb3a241c5

  • SHA512

    345097c11e5409036385f4dd8b8db53bc598c2683c4520c7c3e1b03086a1cdb076ef4410b85dadd5d6f58d72aee00ae3b3adcc3d95e60a4999155284efcb3c6a

  • SSDEEP

    98304:1B2e4zh1DkhXajpVAORIc26nJSBA+aqKnKK5/CYA/Jxc21QF+Qrem47ssl1HPr9d:1Vw80PRDJSa+afb5/Cn/1asQoJ8C

Malware Config

Targets

    • Target

      inema-capdat.apk

    • Size

      7.4MB

    • MD5

      25388da43f0aa24e0734f09b8bc81c7a

    • SHA1

      a28c26e99cbd859437a6a409d52ee380941698db

    • SHA256

      508ee78e646bc8b8edf387e80c8d709c649901536c8444c9a2bb199cb3a241c5

    • SHA512

      345097c11e5409036385f4dd8b8db53bc598c2683c4520c7c3e1b03086a1cdb076ef4410b85dadd5d6f58d72aee00ae3b3adcc3d95e60a4999155284efcb3c6a

    • SSDEEP

      98304:1B2e4zh1DkhXajpVAORIc26nJSBA+aqKnKK5/CYA/Jxc21QF+Qrem47ssl1HPr9d:1Vw80PRDJSa+afb5/Cn/1asQoJ8C

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks