General

  • Target

    a.apk

  • Size

    342KB

  • Sample

    240524-ntd98sfe2v

  • MD5

    40bafe819c785b1068ac58e062eccbe5

  • SHA1

    9716716fafbf2521949939240665b0bc5d260839

  • SHA256

    93aeafbc197474b1139acdeda31c17635424c98e34db27739b63eeee3bdebd12

  • SHA512

    8a29306450e0896c082c9558bea23fda83ccceaec74d85e8a6a325f095710dbbf236ffdb34b49fa17accf9283696b5bd41f8334c4c1f8b4b23fc5ed4c949640d

  • SSDEEP

    6144:chRksDkSpL5m+x2PrJImpL1w6WFvjhRTFvjhRKDne:0lR5APrqmnwlFPFP

Malware Config

Targets

    • Target

      a.apk

    • Size

      342KB

    • MD5

      40bafe819c785b1068ac58e062eccbe5

    • SHA1

      9716716fafbf2521949939240665b0bc5d260839

    • SHA256

      93aeafbc197474b1139acdeda31c17635424c98e34db27739b63eeee3bdebd12

    • SHA512

      8a29306450e0896c082c9558bea23fda83ccceaec74d85e8a6a325f095710dbbf236ffdb34b49fa17accf9283696b5bd41f8334c4c1f8b4b23fc5ed4c949640d

    • SSDEEP

      6144:chRksDkSpL5m+x2PrJImpL1w6WFvjhRTFvjhRKDne:0lR5APrqmnwlFPFP

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

Tasks