General

  • Target

    30EBA69C61AD8A77009101622F314B3ACCD5C5B7020B825DD478AB5BD451831C.apk

  • Size

    11.8MB

  • Sample

    240627-kks59asdle

  • MD5

    7ce5b293c444dbb689f5731c341e2968

  • SHA1

    8d6a56494e9a140e87fae96a732035e1fd1b26fd

  • SHA256

    30eba69c61ad8a77009101622f314b3accd5c5b7020b825dd478ab5bd451831c

  • SHA512

    bb959fbe896a5edba4f7b91a5194c2b69f1fbff0aa861f9af4f28640c8402e1b30c0a647c9f0eff59bed184e4c71065491a0c1e9ea71449b5863457854fc958a

  • SSDEEP

    196608:RaLvVHa+gm3PDTlGaTWOChwlO/OChwlO3lhBsUc8s7PXIYBlhBsUc8s7PXIYAlhE:+dLg4DTlGaWOChwQ/OChwQ3qIYBqIYAk

Malware Config

Targets

    • Target

      30EBA69C61AD8A77009101622F314B3ACCD5C5B7020B825DD478AB5BD451831C.apk

    • Size

      11.8MB

    • MD5

      7ce5b293c444dbb689f5731c341e2968

    • SHA1

      8d6a56494e9a140e87fae96a732035e1fd1b26fd

    • SHA256

      30eba69c61ad8a77009101622f314b3accd5c5b7020b825dd478ab5bd451831c

    • SHA512

      bb959fbe896a5edba4f7b91a5194c2b69f1fbff0aa861f9af4f28640c8402e1b30c0a647c9f0eff59bed184e4c71065491a0c1e9ea71449b5863457854fc958a

    • SSDEEP

      196608:RaLvVHa+gm3PDTlGaTWOChwlO/OChwlO3lhBsUc8s7PXIYBlhBsUc8s7PXIYAlhE:+dLg4DTlGaWOChwQ/OChwQ3qIYBqIYAk

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks