General

  • Target

    OutWharehouse.apk

  • Size

    3.7MB

  • Sample

    240524-pvkdbacf94

  • MD5

    b664079e5047f64bc7522439050ab2be

  • SHA1

    9e7ffdab577e535332a51bd2d9a0585fccebec5e

  • SHA256

    2da84e69b8819a08ea9debb7372321374a93cea0d11f347096edeea21acbddf2

  • SHA512

    c18347bc38f0504fab537afbd81eab2819ca25c125a80bd51c5822827916c6e68931ad36efa25463858b759eb2134fbb20124f8a83af71bbb8605466aaf5b4fa

  • SSDEEP

    98304:FH9aTVfHKKKPlKXet8/XYY9djtqhWdbMuUruwt5a8:7utHXA+YY9dpqkdbMuUruwtU8

Malware Config

Targets

    • Target

      OutWharehouse.apk

    • Size

      3.7MB

    • MD5

      b664079e5047f64bc7522439050ab2be

    • SHA1

      9e7ffdab577e535332a51bd2d9a0585fccebec5e

    • SHA256

      2da84e69b8819a08ea9debb7372321374a93cea0d11f347096edeea21acbddf2

    • SHA512

      c18347bc38f0504fab537afbd81eab2819ca25c125a80bd51c5822827916c6e68931ad36efa25463858b759eb2134fbb20124f8a83af71bbb8605466aaf5b4fa

    • SSDEEP

      98304:FH9aTVfHKKKPlKXet8/XYY9djtqhWdbMuUruwt5a8:7utHXA+YY9dpqkdbMuUruwtU8

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks