General

  • Target

    app8.apk

  • Size

    6.2MB

  • Sample

    240524-pmp9labg43

  • MD5

    646d5f28ee20dd11ab11710543cb8e50

  • SHA1

    3595ca48868c68e9fad512ab8a10499228bfa087

  • SHA256

    e35599b4f61a433e154780cba615ca3017a5cb1bdd3b29e933916af2f18ccc0c

  • SHA512

    e1f426f006c08b1ff0edbb52f72d8454ce9f3cf61f67c0692fd2811308f35e0075d057f2b0745a02568f41fa4cc90c13f91e420eea92fb4ed6c710b18711292f

  • SSDEEP

    196608:8T8/GNYpI1PM1WTpqY94J+gQqgAe7DqPWX:a8WYpI1DpqY9q+wgAe66

Malware Config

Targets

    • Target

      app8.apk

    • Size

      6.2MB

    • MD5

      646d5f28ee20dd11ab11710543cb8e50

    • SHA1

      3595ca48868c68e9fad512ab8a10499228bfa087

    • SHA256

      e35599b4f61a433e154780cba615ca3017a5cb1bdd3b29e933916af2f18ccc0c

    • SHA512

      e1f426f006c08b1ff0edbb52f72d8454ce9f3cf61f67c0692fd2811308f35e0075d057f2b0745a02568f41fa4cc90c13f91e420eea92fb4ed6c710b18711292f

    • SSDEEP

      196608:8T8/GNYpI1PM1WTpqY94J+gQqgAe7DqPWX:a8WYpI1DpqY9q+wgAe66

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks