General

  • Target

    WhatsHack.ver_.1.5.build_.8.apk

  • Size

    2.0MB

  • Sample

    240606-chynysed8z

  • MD5

    5b72cf7c480669ed473c2bf99631a00e

  • SHA1

    4921502a0467946c038de18e17b5d53f9fd1bd7b

  • SHA256

    4c45b4fcce0670756a21382c2b0d03bcfe880a7d257192a59415df32c6b90b7c

  • SHA512

    6de7027f68ecac7ea5ea2201900a6851027b52fc6e54d0c6d610ade928c3c60114aadec77bfdb45e0025e965db197f00a4ab9051e2812f6fcf56f6be4142dde5

  • SSDEEP

    49152:8pl3JenwQcX3/U9IWFceMUKq8NJK7Xrvde7Tzk:8rJeqc9OUKqCJKHFSk

Malware Config

Targets

    • Target

      WhatsHack.ver_.1.5.build_.8.apk

    • Size

      2.0MB

    • MD5

      5b72cf7c480669ed473c2bf99631a00e

    • SHA1

      4921502a0467946c038de18e17b5d53f9fd1bd7b

    • SHA256

      4c45b4fcce0670756a21382c2b0d03bcfe880a7d257192a59415df32c6b90b7c

    • SHA512

      6de7027f68ecac7ea5ea2201900a6851027b52fc6e54d0c6d610ade928c3c60114aadec77bfdb45e0025e965db197f00a4ab9051e2812f6fcf56f6be4142dde5

    • SSDEEP

      49152:8pl3JenwQcX3/U9IWFceMUKq8NJK7Xrvde7Tzk:8rJeqc9OUKqCJKHFSk

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks