General

  • Target

    TNC69-Livecam.apk

  • Size

    5.6MB

  • Sample

    240524-qelrwaeh3z

  • MD5

    63e19606f6527bfc8fb38f6b13305c93

  • SHA1

    1f77e458e43f92c5e08e198c69270dfdc2102a19

  • SHA256

    94cd1720ea223494dfc6cfa17ce8046a44feaac4a77165183bd5547aa0109e02

  • SHA512

    d3e0e76c6dc1eb130efdb620b8c38ee26abe0e95c777064a8aa32d078860af1074089d8237e1d00e0775d3d265118b2f9218fd72d6626576b1107cd9034a133a

  • SSDEEP

    98304:ChAhXFDpz45Qu/6PfSFaMl03EI3jdf3McHk3h0lCvv1vRUoamn6bWo13C1oamnjK:ChAhXFFcxGqFi3EITdf3fk31n1Coi13c

Malware Config

Targets

    • Target

      TNC69-Livecam.apk

    • Size

      5.6MB

    • MD5

      63e19606f6527bfc8fb38f6b13305c93

    • SHA1

      1f77e458e43f92c5e08e198c69270dfdc2102a19

    • SHA256

      94cd1720ea223494dfc6cfa17ce8046a44feaac4a77165183bd5547aa0109e02

    • SHA512

      d3e0e76c6dc1eb130efdb620b8c38ee26abe0e95c777064a8aa32d078860af1074089d8237e1d00e0775d3d265118b2f9218fd72d6626576b1107cd9034a133a

    • SSDEEP

      98304:ChAhXFDpz45Qu/6PfSFaMl03EI3jdf3McHk3h0lCvv1vRUoamn6bWo13C1oamnjK:ChAhXFFcxGqFi3EITdf3fk31n1Coi13c

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks