Resubmissions

28/05/2024, 13:40

240528-qyxcqagg83 8

28/05/2024, 13:39

240528-qx8dlagg56 8

General

  • Target

    com.visax.varisa_3.0.apk

  • Size

    5.4MB

  • Sample

    240528-qx8dlagg56

  • MD5

    97b8df6a48145e6afaaaf4df5e204c07

  • SHA1

    dac8a2e72c453cc53c794a9d4d677bc20c845436

  • SHA256

    eca02a7dbca7a85c78bd76931bb7ae7a284f98009af7223b8c3c68ef095b7c50

  • SHA512

    361b676781075598907a749f428a18eeb36f01c2cc868dd538c686edbea470a07c4e4d8417ee43b8dc2ae1ab521bc0cfe47f1cd9e94c802eead9527679331ded

  • SSDEEP

    98304:pz4WDwYtM6CDZIvtVufuX/PYwP5rJuxzKZD2Q752J7/qkkerrxxi+tJPSWvv7QuX:lXvtMxmouXth1smZtVg/ZkerygQuX

Malware Config

Targets

    • Target

      com.visax.varisa_3.0.apk

    • Size

      5.4MB

    • MD5

      97b8df6a48145e6afaaaf4df5e204c07

    • SHA1

      dac8a2e72c453cc53c794a9d4d677bc20c845436

    • SHA256

      eca02a7dbca7a85c78bd76931bb7ae7a284f98009af7223b8c3c68ef095b7c50

    • SHA512

      361b676781075598907a749f428a18eeb36f01c2cc868dd538c686edbea470a07c4e4d8417ee43b8dc2ae1ab521bc0cfe47f1cd9e94c802eead9527679331ded

    • SSDEEP

      98304:pz4WDwYtM6CDZIvtVufuX/PYwP5rJuxzKZD2Q752J7/qkkerrxxi+tJPSWvv7QuX:lXvtMxmouXth1smZtVg/ZkerygQuX

    • Checks if the Android device is rooted.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks