General

  • Target

    app3.apk

  • Size

    6.2MB

  • Sample

    240524-p8bckaea71

  • MD5

    93ccab42d2a0b21b79d5327c0a2bbf8d

  • SHA1

    6ef7d44dffbe5d437b800ec5c27db59f0f73cbb9

  • SHA256

    2f83fc274a7eece93357394c2c829d3339a2de39d5678b9d3b98e1060d9ba452

  • SHA512

    c9467be5da79a25d86e89dce7646388508ed59bde0b56748e6e3183497c251db572dd61c0116e766e50dcad56caf0cfb77b833bd216e250fc20a1423aa0a6e9b

  • SSDEEP

    98304:yxfKSaFSWvboD9tDWcWHkOqZFq3dcUgARDrXIo9i+J2bQeoQY0OsPW2Z7DSJE6P/:Lxvg9xKEGZgAd4J+gQYPW+7DU

Malware Config

Targets

    • Target

      app3.apk

    • Size

      6.2MB

    • MD5

      93ccab42d2a0b21b79d5327c0a2bbf8d

    • SHA1

      6ef7d44dffbe5d437b800ec5c27db59f0f73cbb9

    • SHA256

      2f83fc274a7eece93357394c2c829d3339a2de39d5678b9d3b98e1060d9ba452

    • SHA512

      c9467be5da79a25d86e89dce7646388508ed59bde0b56748e6e3183497c251db572dd61c0116e766e50dcad56caf0cfb77b833bd216e250fc20a1423aa0a6e9b

    • SSDEEP

      98304:yxfKSaFSWvboD9tDWcWHkOqZFq3dcUgARDrXIo9i+J2bQeoQY0OsPW2Z7DSJE6P/:Lxvg9xKEGZgAd4J+gQYPW+7DU

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks