General

  • Target

    app2.apk

  • Size

    6.2MB

  • Sample

    240524-p3h58add7t

  • MD5

    943921b03585433fb292bb12f7f3824b

  • SHA1

    c6ec572687d6699d2f2170103a1134b1327a34f7

  • SHA256

    dec45adae23b0883c5f34c054b030c878ea224045508ee6e35cc158e9f372347

  • SHA512

    0fdf12a10a549e401fc0787415ea548993eec045167348b5b40683c0643d9964c75adf26adac875572094da6590d36bb31b9ec60f0c669f5052c285eac8bdc9a

  • SSDEEP

    98304:9BqE7EI1N694qCYqZQAWWcWHkKooD0MpomQY0OsPWLJ2bQe4Z7DSJE6PI8DrXIo8:9T7N03vKEKVW1PWLgQb7Dm4JwgAi

Malware Config

Targets

    • Target

      app2.apk

    • Size

      6.2MB

    • MD5

      943921b03585433fb292bb12f7f3824b

    • SHA1

      c6ec572687d6699d2f2170103a1134b1327a34f7

    • SHA256

      dec45adae23b0883c5f34c054b030c878ea224045508ee6e35cc158e9f372347

    • SHA512

      0fdf12a10a549e401fc0787415ea548993eec045167348b5b40683c0643d9964c75adf26adac875572094da6590d36bb31b9ec60f0c669f5052c285eac8bdc9a

    • SSDEEP

      98304:9BqE7EI1N694qCYqZQAWWcWHkKooD0MpomQY0OsPWLJ2bQe4Z7DSJE6PI8DrXIo8:9T7N03vKEKVW1PWLgQb7Dm4JwgAi

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks