General

  • Target

    app4.apk

  • Size

    6.2MB

  • Sample

    240524-ns449sfe58

  • MD5

    ee2a7ba2bf44336212036ca1956dd66a

  • SHA1

    72338d4e663effbd3eba6981dfdf2845901adb5d

  • SHA256

    9a731120b2e7e19a292abbc2f3a0470035c9e58f2ecfcd12d572ba9c7ef58077

  • SHA512

    c010007b1335fc0a7f611d2a6a82ba91047e4e045ef132f955bc8fa6382d16e947fb55426c5a81a990317eb69b1ff49743ab1a81dfabf4fe0872199fe4aab57e

  • SSDEEP

    98304:vQkVd/YPabtvNqZmoD9WcWHkAtu23UgAWZ7DSJE6PI8DrXIo9ihQY0OsPWLJ2bQs:fd/YPahS9KEZjgAe7Dm4JKPWLgQs

Malware Config

Targets

    • Target

      app4.apk

    • Size

      6.2MB

    • MD5

      ee2a7ba2bf44336212036ca1956dd66a

    • SHA1

      72338d4e663effbd3eba6981dfdf2845901adb5d

    • SHA256

      9a731120b2e7e19a292abbc2f3a0470035c9e58f2ecfcd12d572ba9c7ef58077

    • SHA512

      c010007b1335fc0a7f611d2a6a82ba91047e4e045ef132f955bc8fa6382d16e947fb55426c5a81a990317eb69b1ff49743ab1a81dfabf4fe0872199fe4aab57e

    • SSDEEP

      98304:vQkVd/YPabtvNqZmoD9WcWHkAtu23UgAWZ7DSJE6PI8DrXIo9ihQY0OsPWLJ2bQs:fd/YPahS9KEZjgAe7Dm4JKPWLgQs

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks