General

  • Target

    hmjxc.apk

  • Size

    8.1MB

  • Sample

    240524-pqk42scb68

  • MD5

    2b678932f208688b47b1f8d5927fa78a

  • SHA1

    122117950f22877bfdcd28db6c5b9f66a09127f5

  • SHA256

    bd1286cc2a33b98bc3e5c4a36c9d87ce9b067451babd9eaaea11e71fff1cb9ef

  • SHA512

    0eed2ec57088dcd0d158429b64d94463987f4ad31fff6749d4dd41f39ca047ca268fdfd253804e15bbc69370f8451124cbf898217d4bb41da0d901a3ae07d29a

  • SSDEEP

    196608:062sEKE0U7yRoqOvFQrLx09K0qRPt7y65:oivvo/ON6KxRZyS

Malware Config

Targets

    • Target

      hmjxc.apk

    • Size

      8.1MB

    • MD5

      2b678932f208688b47b1f8d5927fa78a

    • SHA1

      122117950f22877bfdcd28db6c5b9f66a09127f5

    • SHA256

      bd1286cc2a33b98bc3e5c4a36c9d87ce9b067451babd9eaaea11e71fff1cb9ef

    • SHA512

      0eed2ec57088dcd0d158429b64d94463987f4ad31fff6749d4dd41f39ca047ca268fdfd253804e15bbc69370f8451124cbf898217d4bb41da0d901a3ae07d29a

    • SSDEEP

      196608:062sEKE0U7yRoqOvFQrLx09K0qRPt7y65:oivvo/ON6KxRZyS

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks