General

  • Target

    My Diary - Daily Diary Journal_1.03.48.0603_APKPure.apk

  • Size

    46.3MB

  • Sample

    240606-t8j2xsgf7t

  • MD5

    0dbe66b9e38792def35ae72496d77777

  • SHA1

    031de46c26560dee3069866a8c7f0ff11fd78aec

  • SHA256

    c8624055a0dfbb057b90e7ba01cb78a3ba299c3664cb33389b1f3d8757719f67

  • SHA512

    a61c2aafaa546c5843417b1e911b38d70c83878890330c559cb097606e96b7a2d960a259719e18762214451f60c1cd46a650c25f102466846724529c3e66c62d

  • SSDEEP

    786432:OriGqfWApavA6byO4+KLaeHY1uYxX6hItsKKuIoYDhIgvdM:WiGqfWPiOYLaeIuYxX6hYP/YOYM

Malware Config

Targets

    • Target

      My Diary - Daily Diary Journal_1.03.48.0603_APKPure.apk

    • Size

      46.3MB

    • MD5

      0dbe66b9e38792def35ae72496d77777

    • SHA1

      031de46c26560dee3069866a8c7f0ff11fd78aec

    • SHA256

      c8624055a0dfbb057b90e7ba01cb78a3ba299c3664cb33389b1f3d8757719f67

    • SHA512

      a61c2aafaa546c5843417b1e911b38d70c83878890330c559cb097606e96b7a2d960a259719e18762214451f60c1cd46a650c25f102466846724529c3e66c62d

    • SSDEEP

      786432:OriGqfWApavA6byO4+KLaeHY1uYxX6hItsKKuIoYDhIgvdM:WiGqfWPiOYLaeIuYxX6hYP/YOYM

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Matrix

Tasks