General

  • Target

    app0.apk

  • Size

    7.5MB

  • Sample

    240524-ntq9ssff56

  • MD5

    e27d8392696956d77f75fae7191e641e

  • SHA1

    973e932e7c04e1d6606eebb960dc4ce5a635dd46

  • SHA256

    372c044485e5798002a476bce7edbf8f97de78bdb8b81e0917a5e0d48fca166a

  • SHA512

    96127ef376514bc70a7a0cdaa4e87238811b8793323e33fdbfa96381f11884ab2e4219ee6cb3057371e094ffe4eb29ef6e71fafc190f4adecde2330aaff3996c

  • SSDEEP

    196608:PHWMaZMJsWzKE3AfMDgf8wgQqgAd4JZ7DqPWy:Ooq43AUMf8wwgAdqZ65

Malware Config

Targets

    • Target

      app0.apk

    • Size

      7.5MB

    • MD5

      e27d8392696956d77f75fae7191e641e

    • SHA1

      973e932e7c04e1d6606eebb960dc4ce5a635dd46

    • SHA256

      372c044485e5798002a476bce7edbf8f97de78bdb8b81e0917a5e0d48fca166a

    • SHA512

      96127ef376514bc70a7a0cdaa4e87238811b8793323e33fdbfa96381f11884ab2e4219ee6cb3057371e094ffe4eb29ef6e71fafc190f4adecde2330aaff3996c

    • SSDEEP

      196608:PHWMaZMJsWzKE3AfMDgf8wgQqgAd4JZ7DqPWy:Ooq43AUMf8wwgAdqZ65

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks