General

  • Target

    Doki Doki Outcast.apk

  • Size

    342.1MB

  • Sample

    240617-wrmgtssfql

  • MD5

    1d7c33ec1032e99ab55cfbb1b0bdf634

  • SHA1

    c6ece3e853b303c9f027356b63f4c324b636dfd0

  • SHA256

    d2a2639828c187fe4fe6d3a5e4999f7dc67213a681c00dad9eb993791b6d12cd

  • SHA512

    b56c6e3b0b12c094015b9aa084c2968909df07e9d6da9fdbf81b605b0a812a091c390b612e200ccf52340d8a49911ec4d8d658740be9b427dcc8863333b72156

  • SSDEEP

    6291456:xmBDt1kLKw/AFng5Uj7GD3RRTEDeUxwzrJLh4MCWdZUsySSZnqRhrs/N:x4DXZw/AtHGzRk6eMbqsYP

Malware Config

Targets

    • Target

      Doki Doki Outcast.apk

    • Size

      342.1MB

    • MD5

      1d7c33ec1032e99ab55cfbb1b0bdf634

    • SHA1

      c6ece3e853b303c9f027356b63f4c324b636dfd0

    • SHA256

      d2a2639828c187fe4fe6d3a5e4999f7dc67213a681c00dad9eb993791b6d12cd

    • SHA512

      b56c6e3b0b12c094015b9aa084c2968909df07e9d6da9fdbf81b605b0a812a091c390b612e200ccf52340d8a49911ec4d8d658740be9b427dcc8863333b72156

    • SSDEEP

      6291456:xmBDt1kLKw/AFng5Uj7GD3RRTEDeUxwzrJLh4MCWdZUsySSZnqRhrs/N:x4DXZw/AtHGzRk6eMbqsYP

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks