General

  • Target

    app.apk.zip

  • Size

    1.5MB

  • Sample

    240603-mwne9abh4t

  • MD5

    72d86701b0c092a88a43618d17b8eca7

  • SHA1

    33d808af1a6bc9844bfdcc54c5d8acc8a06ff22c

  • SHA256

    3f544136366b2cc27d12aa310c38cbde3234c9fa173a362dc539e67730729d22

  • SHA512

    e7ecc17f9d4444e57d506901918c15f3afb6a1c70f7ae71683a835dae683cae331132613f404138c7afff9d7d81df841d806de7a0e8bc3487aa6a5ef54b34ae9

  • SSDEEP

    24576:9KYUUDUubf/r6kmbFpkSyLy0yNK9SvwtonivETrnNQNmHdyo9txGCyJr9Y9:9KYd/rObFt0yNK0vVniMTrNQg9xtEpr+

Malware Config

Targets

    • Target

      app.apk.zip

    • Size

      1.5MB

    • MD5

      72d86701b0c092a88a43618d17b8eca7

    • SHA1

      33d808af1a6bc9844bfdcc54c5d8acc8a06ff22c

    • SHA256

      3f544136366b2cc27d12aa310c38cbde3234c9fa173a362dc539e67730729d22

    • SHA512

      e7ecc17f9d4444e57d506901918c15f3afb6a1c70f7ae71683a835dae683cae331132613f404138c7afff9d7d81df841d806de7a0e8bc3487aa6a5ef54b34ae9

    • SSDEEP

      24576:9KYUUDUubf/r6kmbFpkSyLy0yNK9SvwtonivETrnNQNmHdyo9txGCyJr9Y9:9KYd/rObFt0yNK0vVniMTrNQg9xtEpr+

    Score
    1/10
    • Target

      __MACOSX/._app.apk

    • Size

      229B

    • MD5

      41d0e369fe00c6aa88f44079832631ab

    • SHA1

      e3825071cab666f192c856eb1f3f9352e9c5213f

    • SHA256

      bf3f386270515e1bf95f7f4964123aa2329c5d498c3119f3d13d7b56d341f5be

    • SHA512

      d8fe421d05d8098a0cb4603e65ddc8aee8ab5f2d72e4dac4bdbfd8c60e24334a38f3906f9aa111152225e679507e5eef981789cfb450d1595ce1d23cbd8290f8

    Score
    1/10
    • Target

      app.apk

    • Size

      2.3MB

    • MD5

      86af5971c04b2f06c9baa4b157c2295e

    • SHA1

      6fbaf094c9f380497dacbd533d529bb5bbda64ec

    • SHA256

      baf685f245e0003cad433a2d232d2ce74f08326bc4190838efd6f8910e83e500

    • SHA512

      3067620535784a7ac1cf2b84d1607a9c347aa56012fced02a2f58c24ed9d82265902211eb4c7baf8bb19bf4e6d52bb406ea0a0121ff1cb20d41d174e30202ef2

    • SSDEEP

      49152:71w4wwwoA4RHKN2t2prNA0MB6WPUSNgZc7i0rO1+u1:71w4wLaHKN20rcX7i0rO8u1

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks