General

  • Target

    HappyMod-3-1-1.apk

  • Size

    17.3MB

  • Sample

    240624-rrslmawglg

  • MD5

    2374b9b56e0eaac81fafa5a2eb219bdf

  • SHA1

    1af4b5f9b22268019b3f09214926b472fa188b25

  • SHA256

    bf4fb5b1a0f6dd65499e4b5e2fff102d4958d235f0ef79d21d4a0d271ebf2e47

  • SHA512

    3e037c437a38742dcf6f54478ed200ff149ad5dd57dafd11f87b98bcfd2cc93744adb3566e1eb498d7b1e77da56fd6b159b839ca3bd8432faf1d3010cd894af2

  • SSDEEP

    393216:np0TcbMT8VhcEb7NN+tiqxwPDBxvghsreQBzhpGPG41VSzp:nacQTicED+QrHghsrH5hkPGAVI

Malware Config

Targets

    • Target

      HappyMod-3-1-1.apk

    • Size

      17.3MB

    • MD5

      2374b9b56e0eaac81fafa5a2eb219bdf

    • SHA1

      1af4b5f9b22268019b3f09214926b472fa188b25

    • SHA256

      bf4fb5b1a0f6dd65499e4b5e2fff102d4958d235f0ef79d21d4a0d271ebf2e47

    • SHA512

      3e037c437a38742dcf6f54478ed200ff149ad5dd57dafd11f87b98bcfd2cc93744adb3566e1eb498d7b1e77da56fd6b159b839ca3bd8432faf1d3010cd894af2

    • SSDEEP

      393216:np0TcbMT8VhcEb7NN+tiqxwPDBxvghsreQBzhpGPG41VSzp:nacQTicED+QrHghsrH5hkPGAVI

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks