Resubmissions

10-06-2024 15:21

240610-srjjds1gpn 8

10-06-2024 15:16

240610-snmrms1bmg 8

10-06-2024 14:41

240610-r2p89azcla 8

General

  • Target

    D SPEED 2.0.apk

  • Size

    7.1MB

  • Sample

    240610-snmrms1bmg

  • MD5

    7d137a79d7f51456ca51419e6b9a1b14

  • SHA1

    1923208581fc5e3bfd1443caa1a32ee2245bef22

  • SHA256

    b43104d4889e4b4c905394d43a580ddac211128a1db8094f00f6b99de264f1d8

  • SHA512

    d5c5ffd0777e5d4b7a19356edc673cd1e36bd32d227ae4aabf376a55f01301fd3e164249641b1c6fb0c7a98bd63cedb4278854401878e860bef4d04b86dc3d40

  • SSDEEP

    196608:FYx/1oXWagGWo1C4bDmyvv5rmbboofCg6kkUa:XWCWI5Gkv5rmbbpqLH

Malware Config

Targets

    • Target

      D SPEED 2.0.apk

    • Size

      7.1MB

    • MD5

      7d137a79d7f51456ca51419e6b9a1b14

    • SHA1

      1923208581fc5e3bfd1443caa1a32ee2245bef22

    • SHA256

      b43104d4889e4b4c905394d43a580ddac211128a1db8094f00f6b99de264f1d8

    • SHA512

      d5c5ffd0777e5d4b7a19356edc673cd1e36bd32d227ae4aabf376a55f01301fd3e164249641b1c6fb0c7a98bd63cedb4278854401878e860bef4d04b86dc3d40

    • SSDEEP

      196608:FYx/1oXWagGWo1C4bDmyvv5rmbboofCg6kkUa:XWCWI5Gkv5rmbbpqLH

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks