Resubmissions

General

  • Target

    KİNGTV.apk

  • Size

    23.4MB

  • Sample

    240603-s2vpeacc66

  • MD5

    39e3904dc76db9f28db746f4f54b7d30

  • SHA1

    fd4d926e77c1364112671fded25cd47524ea2d0f

  • SHA256

    70b382051d82a636ae6b7d015dece8b3c6e45103a56bebd93412969bdb17e9e5

  • SHA512

    adbd942c55590330c6a3b6477ae728d6e84bbeb0508244cea9e37786ddc3481c5821b6ebabdbf1e28a507a2a84e6cb0536aa70e884fb2abae5a54d22f1e72858

  • SSDEEP

    393216:I1zlz8SUdugMaBRHkQtQjFflRrN7sWbF4FrvLtdzuRMEphOM2YRYFo6q:85ASUduCB+QtQjHR57s2mFrpYuEph/Rn

Malware Config

Targets

    • Target

      KİNGTV.apk

    • Size

      23.4MB

    • MD5

      39e3904dc76db9f28db746f4f54b7d30

    • SHA1

      fd4d926e77c1364112671fded25cd47524ea2d0f

    • SHA256

      70b382051d82a636ae6b7d015dece8b3c6e45103a56bebd93412969bdb17e9e5

    • SHA512

      adbd942c55590330c6a3b6477ae728d6e84bbeb0508244cea9e37786ddc3481c5821b6ebabdbf1e28a507a2a84e6cb0536aa70e884fb2abae5a54d22f1e72858

    • SSDEEP

      393216:I1zlz8SUdugMaBRHkQtQjFflRrN7sWbF4FrvLtdzuRMEphOM2YRYFo6q:85ASUduCB+QtQjHR57s2mFrpYuEph/Rn

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks