General
-
Target
MangaToon v3.18.04 (Premium)_mundoperfecto.io.apk
-
Size
104.3MB
-
Sample
240726-t4pfvataqf
-
MD5
eabfff53b481fa35dd1f75884e5c720b
-
SHA1
268c277314becc2545aac745f9d6745f1ea4afd9
-
SHA256
03cf7e6e80e5b24788495610c323d007be3b1278b15a6a25f2857397b07535ee
-
SHA512
88caefbcb1c09354a2a01ff99c26e95803d8fc1f017854b584b867dfcee63d2eb803570a16b1ec25b2dfa2f321379b72d4a4395227bd9673127ae0c760f0c2dc
-
SSDEEP
1572864:MtYcwcszbQ+c/AYA/oZDtvgec/Y/NiXY9jKBe:MtYJb8Ad/8DtvgcZj7
Static task
static1
Behavioral task
behavioral1
Sample
MangaToon v3.18.04 (Premium)_mundoperfecto.io.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
MangaToon v3.18.04 (Premium)_mundoperfecto.io.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
origin.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
origin.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
MangaToon v3.18.04 (Premium)_mundoperfecto.io.apk
-
Size
104.3MB
-
MD5
eabfff53b481fa35dd1f75884e5c720b
-
SHA1
268c277314becc2545aac745f9d6745f1ea4afd9
-
SHA256
03cf7e6e80e5b24788495610c323d007be3b1278b15a6a25f2857397b07535ee
-
SHA512
88caefbcb1c09354a2a01ff99c26e95803d8fc1f017854b584b867dfcee63d2eb803570a16b1ec25b2dfa2f321379b72d4a4395227bd9673127ae0c760f0c2dc
-
SSDEEP
1572864:MtYcwcszbQ+c/AYA/oZDtvgec/Y/NiXY9jKBe:MtYJb8Ad/8DtvgcZj7
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests dangerous framework permissions
-
Checks the presence of a debugger
-
-
-
Target
origin.apk
-
Size
51.2MB
-
MD5
25be3982c842f5c825cd720b54d1fb6e
-
SHA1
a7296b135c03a086413fc8a21a6ae6c860768cc8
-
SHA256
a602192f25712e995a042470e99e5d83aa5d1606312a4b87e62c3c2fba092d91
-
SHA512
749796216c605d490f6f38f03e62cdc7c30321b578a0632544461a9f42d2ad84a8678b3d909f590e05f973d4c27dd4187da1ff23a71d88f0aa5baee067dcfc3d
-
SSDEEP
786432:0+c/QjYQHB/oXW9aDtxQKbFgecb0KY/N8p27SI:0+c/AYA/oZDtvgec/Y/NiI
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2