General

  • Target

    Test_inema-capdat.apk

  • Size

    7.4MB

  • Sample

    240524-p8rpjseb3w

  • MD5

    5cada14b7bf2832cf017d56e877a03b4

  • SHA1

    e48165a0ee1b1e804d34dadcc151eecc507878d0

  • SHA256

    5c1b1eaa10bfa30cc15eecf3352e843e16d8fd8732aa163c748be63baa1b82b3

  • SHA512

    13f42904e42dd6de855bd118cbc41f79127b1ec9c56609f4b6d950de9ebd3e52860cb96757be97c2e3d487bf1a76665e1e19532da03fd9d83aadf5aa4af079cc

  • SSDEEP

    98304:123Dne4zh1DkhXajpVAORIc26nJSBA+aqKnKK5/CYA/Jxc21QF+Qrem47ssl1HPo:14ew80PRDJSa+afb5/Cn/1asQoJhKl

Malware Config

Targets

    • Target

      Test_inema-capdat.apk

    • Size

      7.4MB

    • MD5

      5cada14b7bf2832cf017d56e877a03b4

    • SHA1

      e48165a0ee1b1e804d34dadcc151eecc507878d0

    • SHA256

      5c1b1eaa10bfa30cc15eecf3352e843e16d8fd8732aa163c748be63baa1b82b3

    • SHA512

      13f42904e42dd6de855bd118cbc41f79127b1ec9c56609f4b6d950de9ebd3e52860cb96757be97c2e3d487bf1a76665e1e19532da03fd9d83aadf5aa4af079cc

    • SSDEEP

      98304:123Dne4zh1DkhXajpVAORIc26nJSBA+aqKnKK5/CYA/Jxc21QF+Qrem47ssl1HPo:14ew80PRDJSa+afb5/Cn/1asQoJhKl

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks