Resubmissions

12/07/2024, 14:59

240712-scrlfsydjr 8

12/07/2024, 02:48

240712-dah4zavhlm 6

General

  • Target

    com.noahcdesign.fnquiz.apk

  • Size

    79.6MB

  • Sample

    240712-scrlfsydjr

  • MD5

    714b1d9751507c41095d4a8051fe07e5

  • SHA1

    5878c722dc654a0a3d3fa478662420efe6edffb2

  • SHA256

    9f1f5d0d8a628c5715ea899d93eaf3e9dd716bcee35ce74d21832e8d3829803b

  • SHA512

    138a2f10b7c71bb401e0be88f95057c15f08da2ba1f48a18eefddbdd75dbb3264371d655b6189a5dd1e4afa5520f434f69e285f0fd614cfb250ccebb9baa016c

  • SSDEEP

    1572864:8TxR80YZR80YbR80YAR80Y0R80Y7R80Y6R80YNR80YoR80YmR80YAR80YdR80Ybi:8Pe8BZEPmJH9eEPq2j0FHiQ

Malware Config

Targets

    • Target

      com.noahcdesign.fnquiz.apk

    • Size

      79.6MB

    • MD5

      714b1d9751507c41095d4a8051fe07e5

    • SHA1

      5878c722dc654a0a3d3fa478662420efe6edffb2

    • SHA256

      9f1f5d0d8a628c5715ea899d93eaf3e9dd716bcee35ce74d21832e8d3829803b

    • SHA512

      138a2f10b7c71bb401e0be88f95057c15f08da2ba1f48a18eefddbdd75dbb3264371d655b6189a5dd1e4afa5520f434f69e285f0fd614cfb250ccebb9baa016c

    • SSDEEP

      1572864:8TxR80YZR80YbR80YAR80Y0R80Y7R80Y6R80YNR80YoR80YmR80YAR80YdR80Ybi:8Pe8BZEPmJH9eEPq2j0FHiQ

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks