General

  • Target

    app.apk

  • Size

    6.3MB

  • Sample

    240524-qh36bsfd96

  • MD5

    f0033d4b3bad0340894cba29650a6464

  • SHA1

    4cde57a6e116e41b7dad0d3dbae104b554c227cf

  • SHA256

    9953a318d8fa00111ee58e8ea1728718457ca070b2377e81db97553c80efbf7c

  • SHA512

    976caf9f016196c1cb9d661d3b250b1868c22404c0349f9679f9b39ede14e32d803f65d9daf0f936d2d43bfa763a075fc307cf96fe91de5ed9e1de00cb11ad70

  • SSDEEP

    98304:WXrIAvEBdXdOlqZlYfoDhrbLIB9TYIZ7DSJE6PIRUgArJ2bQeoQY0OsPWxDrXIoS:WXkAvEBdXgZEd/hk7DQgArgQYPW94J5

Malware Config

Targets

    • Target

      app.apk

    • Size

      6.3MB

    • MD5

      f0033d4b3bad0340894cba29650a6464

    • SHA1

      4cde57a6e116e41b7dad0d3dbae104b554c227cf

    • SHA256

      9953a318d8fa00111ee58e8ea1728718457ca070b2377e81db97553c80efbf7c

    • SHA512

      976caf9f016196c1cb9d661d3b250b1868c22404c0349f9679f9b39ede14e32d803f65d9daf0f936d2d43bfa763a075fc307cf96fe91de5ed9e1de00cb11ad70

    • SSDEEP

      98304:WXrIAvEBdXdOlqZlYfoDhrbLIB9TYIZ7DSJE6PIRUgArJ2bQeoQY0OsPWxDrXIoS:WXkAvEBdXgZEd/hk7DQgArgQYPW94J5

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks