General
-
Target
HappyMod-3-1-1.apk
-
Size
17.3MB
-
Sample
240719-11tdyssdqj
-
MD5
2374b9b56e0eaac81fafa5a2eb219bdf
-
SHA1
1af4b5f9b22268019b3f09214926b472fa188b25
-
SHA256
bf4fb5b1a0f6dd65499e4b5e2fff102d4958d235f0ef79d21d4a0d271ebf2e47
-
SHA512
3e037c437a38742dcf6f54478ed200ff149ad5dd57dafd11f87b98bcfd2cc93744adb3566e1eb498d7b1e77da56fd6b159b839ca3bd8432faf1d3010cd894af2
-
SSDEEP
393216:np0TcbMT8VhcEb7NN+tiqxwPDBxvghsreQBzhpGPG41VSzp:nacQTicED+QrHghsrH5hkPGAVI
Static task
static1
Behavioral task
behavioral1
Sample
HappyMod-3-1-1.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
HappyMod-3-1-1.apk
-
Size
17.3MB
-
MD5
2374b9b56e0eaac81fafa5a2eb219bdf
-
SHA1
1af4b5f9b22268019b3f09214926b472fa188b25
-
SHA256
bf4fb5b1a0f6dd65499e4b5e2fff102d4958d235f0ef79d21d4a0d271ebf2e47
-
SHA512
3e037c437a38742dcf6f54478ed200ff149ad5dd57dafd11f87b98bcfd2cc93744adb3566e1eb498d7b1e77da56fd6b159b839ca3bd8432faf1d3010cd894af2
-
SSDEEP
393216:np0TcbMT8VhcEb7NN+tiqxwPDBxvghsreQBzhpGPG41VSzp:nacQTicED+QrHghsrH5hkPGAVI
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2