General

  • Target

    ysyy.apk

  • Size

    5.3MB

  • Sample

    240526-p7s6zsef2t

  • MD5

    818de386f21610b720c9b71e97fbd582

  • SHA1

    196ea309ef5b3e2e6dd54c3232d8f87fc546aa70

  • SHA256

    c30231e1803681eac62ca076b74d870cd4d4dd843f3b79c23d5a2a00a4a81fc3

  • SHA512

    de18fbad059326f13e1c91540c0bd64d12ae68c8a670a77b094896cc487089740176454f252cda495aaaa014aa9111d2fa502ba9ac393da82ebe74bbba59e9ca

  • SSDEEP

    98304:T3ASO4U8Z3TlD0YAg3gJI5yDiF0hWWF+yKmB6UOgFlYMuaB03aaB03NaB03JaB0M:r04vTvBL5yD2wWFfUV0A0qA0dA0ZA0Af

Malware Config

Targets

    • Target

      ysyy.apk

    • Size

      5.3MB

    • MD5

      818de386f21610b720c9b71e97fbd582

    • SHA1

      196ea309ef5b3e2e6dd54c3232d8f87fc546aa70

    • SHA256

      c30231e1803681eac62ca076b74d870cd4d4dd843f3b79c23d5a2a00a4a81fc3

    • SHA512

      de18fbad059326f13e1c91540c0bd64d12ae68c8a670a77b094896cc487089740176454f252cda495aaaa014aa9111d2fa502ba9ac393da82ebe74bbba59e9ca

    • SSDEEP

      98304:T3ASO4U8Z3TlD0YAg3gJI5yDiF0hWWF+yKmB6UOgFlYMuaB03aaB03NaB03JaB0M:r04vTvBL5yD2wWFfUV0A0qA0dA0ZA0Af

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks