General

  • Target

    dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9

  • Size

    2.0MB

  • Sample

    240524-psrplsce23

  • MD5

    7d0279c6e4ec3727984ac68a13b23bd7

  • SHA1

    7b49ea135149bfd6d3870a882e344de195e7e6f0

  • SHA256

    dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9

  • SHA512

    aadfa7a053d6c51f3c807561ccaa155f01dae9bc6caf8c2b11a896b45b9291ddd695ba5bf1007937d13f35417c249bda4e94a40871f1c8a5919f0df34dc32163

  • SSDEEP

    49152:I/gGuqURokkd7DHuugOq8PQNgnNnfOpLv4tmZUV:ugGuJRo/lDOugOq8INgnxU8tXV

Malware Config

Targets

    • Target

      dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9

    • Size

      2.0MB

    • MD5

      7d0279c6e4ec3727984ac68a13b23bd7

    • SHA1

      7b49ea135149bfd6d3870a882e344de195e7e6f0

    • SHA256

      dab0c77957c0341a749a4aeb030364982f230ad08a5c77c94d2bd95f5ed596a9

    • SHA512

      aadfa7a053d6c51f3c807561ccaa155f01dae9bc6caf8c2b11a896b45b9291ddd695ba5bf1007937d13f35417c249bda4e94a40871f1c8a5919f0df34dc32163

    • SSDEEP

      49152:I/gGuqURokkd7DHuugOq8PQNgnNnfOpLv4tmZUV:ugGuJRo/lDOugOq8INgnxU8tXV

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks