General

  • Target

    skynet-cputhrottlingtest-13-35475134-8d27efd9fbd4bc894a25ea3b484c6d76.apk

  • Size

    4.6MB

  • Sample

    240604-ng89vafa23

  • MD5

    8d27efd9fbd4bc894a25ea3b484c6d76

  • SHA1

    c213fd7629712b43ebded3f4141b69e57503bf94

  • SHA256

    f16b1e8497cec6025bff1ab50e6329e2aa007342a76ce4dc93e5b8d907d40504

  • SHA512

    15edad5a5e93ed603bc5d3217dcddd69bfe1197f07200023cf6be4da1fe8b5d35508455716b18bd8cbaf2d401d04d21d22dee5d98a59c4666cd5e49215e70423

  • SSDEEP

    98304:a6HVEdpb9Q5H8dJ/fKcKQT5sLYC3Vgk5zxYkukd7S90:agVepb9vdJ/fKcXUeAzxnuE7T

Malware Config

Targets

    • Target

      skynet-cputhrottlingtest-13-35475134-8d27efd9fbd4bc894a25ea3b484c6d76.apk

    • Size

      4.6MB

    • MD5

      8d27efd9fbd4bc894a25ea3b484c6d76

    • SHA1

      c213fd7629712b43ebded3f4141b69e57503bf94

    • SHA256

      f16b1e8497cec6025bff1ab50e6329e2aa007342a76ce4dc93e5b8d907d40504

    • SHA512

      15edad5a5e93ed603bc5d3217dcddd69bfe1197f07200023cf6be4da1fe8b5d35508455716b18bd8cbaf2d401d04d21d22dee5d98a59c4666cd5e49215e70423

    • SSDEEP

      98304:a6HVEdpb9Q5H8dJ/fKcKQT5sLYC3Vgk5zxYkukd7S90:agVepb9vdJ/fKcXUeAzxnuE7T

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks