General

  • Target

    OBonQuignon.apk

  • Size

    2.7MB

  • Sample

    240524-pnpdpabh53

  • MD5

    b3423a174ccf4658f626db2b0341fb80

  • SHA1

    28abb394619b29bf1acf01642a3b604d68d5457b

  • SHA256

    6d59d02b1a4281dd74168dd3264b87792e27570f6f12c213d5b8f4335f489197

  • SHA512

    b6b68f75d8a44719d56f4b938c43343de36e1a6eab8447fe425f327f6ab933ff22e64933cd194ab07fe5935308ddf2631f8914d71676588c3380b6dc36ed7227

  • SSDEEP

    49152:1LVeGpNhyx/tM6JVWr7QTeI9qcjnc734w9H5Dn/jvkQZe:1J3pNwJtM6CkaIvLA9H5r/7be

Malware Config

Targets

    • Target

      OBonQuignon.apk

    • Size

      2.7MB

    • MD5

      b3423a174ccf4658f626db2b0341fb80

    • SHA1

      28abb394619b29bf1acf01642a3b604d68d5457b

    • SHA256

      6d59d02b1a4281dd74168dd3264b87792e27570f6f12c213d5b8f4335f489197

    • SHA512

      b6b68f75d8a44719d56f4b938c43343de36e1a6eab8447fe425f327f6ab933ff22e64933cd194ab07fe5935308ddf2631f8914d71676588c3380b6dc36ed7227

    • SSDEEP

      49152:1LVeGpNhyx/tM6JVWr7QTeI9qcjnc734w9H5Dn/jvkQZe:1J3pNwJtM6CkaIvLA9H5r/7be

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks