General

  • Target

    app5.apk

  • Size

    6.2MB

  • Sample

    240524-p8ae9sea7y

  • MD5

    7bd93ad57b4f8d24068e988077520497

  • SHA1

    a1cb386a9015863c16755bd6d36787a9e6c9b906

  • SHA256

    dd218c590933f666bc4708236fc1392ea92c937a41ceb3a209a58e9fa200d5c1

  • SHA512

    85dc3396121655ab7a1bcd170b9ad5367c77f7184a849b3d97409a4361c26ab8049b405515310353d7af90ce7b2d7139bc896e7f5b38a6149ed4f4f160695bf2

  • SSDEEP

    98304:8x4FwQYf7LXjoDGCvWcWHkTqZIlwFeJ2bQe4Z7DSJE6PI8DrXIo9ihQY0OsPWuUx:8zQYf3oGiKESegQb7Dm4JKPWNgAt

Malware Config

Targets

    • Target

      app5.apk

    • Size

      6.2MB

    • MD5

      7bd93ad57b4f8d24068e988077520497

    • SHA1

      a1cb386a9015863c16755bd6d36787a9e6c9b906

    • SHA256

      dd218c590933f666bc4708236fc1392ea92c937a41ceb3a209a58e9fa200d5c1

    • SHA512

      85dc3396121655ab7a1bcd170b9ad5367c77f7184a849b3d97409a4361c26ab8049b405515310353d7af90ce7b2d7139bc896e7f5b38a6149ed4f4f160695bf2

    • SSDEEP

      98304:8x4FwQYf7LXjoDGCvWcWHkTqZIlwFeJ2bQe4Z7DSJE6PI8DrXIo9ihQY0OsPWuUx:8zQYf3oGiKESegQb7Dm4JKPWNgAt

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks