General

  • Target

    app1.apk

  • Size

    6.2MB

  • Sample

    240524-pe6avaad9w

  • MD5

    f72b084405f9fed876c4361903790d11

  • SHA1

    40c7044f4cdb3f0ed2f73d95d21abc4e73263061

  • SHA256

    e6c5bda87d76a180c59a9e97c544abf9fcfcf9ae54ffdf421042fce11040685a

  • SHA512

    9ed5ff31184b2b3659d447a8b5178433e8983565665584ab696e212fb8b0a45cdd57c9dabf24495c88d47b067a3d35c3c8c548689cecf57e05a40fd64dd54506

  • SSDEEP

    98304:l/e46c+WR/KWcWHkqoDa5aqZZlL2DcZUgARDrXIo9ihQY0OsPWLJ2bQe4Z7DSJEP:5RhZKKE3a3m3gAd4JKPWLgQb7D3

Malware Config

Targets

    • Target

      app1.apk

    • Size

      6.2MB

    • MD5

      f72b084405f9fed876c4361903790d11

    • SHA1

      40c7044f4cdb3f0ed2f73d95d21abc4e73263061

    • SHA256

      e6c5bda87d76a180c59a9e97c544abf9fcfcf9ae54ffdf421042fce11040685a

    • SHA512

      9ed5ff31184b2b3659d447a8b5178433e8983565665584ab696e212fb8b0a45cdd57c9dabf24495c88d47b067a3d35c3c8c548689cecf57e05a40fd64dd54506

    • SSDEEP

      98304:l/e46c+WR/KWcWHkqoDa5aqZZlL2DcZUgARDrXIo9ihQY0OsPWLJ2bQe4Z7DSJEP:5RhZKKE3a3m3gAd4JKPWLgQb7D3

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks