General

  • Target

    menuscreen-prod.apk

  • Size

    5.3MB

  • Sample

    240524-pm3jxsbf4s

  • MD5

    9042faa236cbf60e6963576347120053

  • SHA1

    1ea0252c02e1c184585adbadeb30a59518a3371f

  • SHA256

    5c54bb291705a2ddc4b0de072ff1e32926e5390c22ac0f0348e9fc6e0e5011b7

  • SHA512

    9fce1a786d6f90c86ed212ced6eea8b7b09205dfb6079c73c0f96e20aee66e815d187066cb7a386beddbcce68f51b4f381090a2ac9535520b022209da36ee00e

  • SSDEEP

    98304:4PLjhnLbkYWcXVPC0YlR8bX9APnVUFE3fMsDqk6979Fb/ad:GjhnPRW8PLmR8mVsPFG

Malware Config

Targets

    • Target

      menuscreen-prod.apk

    • Size

      5.3MB

    • MD5

      9042faa236cbf60e6963576347120053

    • SHA1

      1ea0252c02e1c184585adbadeb30a59518a3371f

    • SHA256

      5c54bb291705a2ddc4b0de072ff1e32926e5390c22ac0f0348e9fc6e0e5011b7

    • SHA512

      9fce1a786d6f90c86ed212ced6eea8b7b09205dfb6079c73c0f96e20aee66e815d187066cb7a386beddbcce68f51b4f381090a2ac9535520b022209da36ee00e

    • SSDEEP

      98304:4PLjhnLbkYWcXVPC0YlR8bX9APnVUFE3fMsDqk6979Fb/ad:GjhnPRW8PLmR8mVsPFG

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks