General

  • Target

    Brawl Stars.apk

  • Size

    10.2MB

  • Sample

    240802-vh3a9axara

  • MD5

    e97b039ac6da62957451a4f624a61ed7

  • SHA1

    a09b5d2e8d35ac7f8b3cac421f88774c220c1b42

  • SHA256

    e24fea12d4dda1228d1c31e2318bebc9cdc8e146aee900e69d6f691838cdb59c

  • SHA512

    d1ebf4669e02e627c64c12eaeb89e4fc4625d43c86f8fe56bbf6794c1b2c6c244ded2978c496eca5c8da255ca78fd45f080ec243740a9782e34f3ffe91fd2312

  • SSDEEP

    196608:PcXuU9Y5MoTubltQHFiuBEWVPT+VUWh/fZpjIAHI2eyhriYH1QQmW10Y4gkGuX98:Ee6oS7Qo+LVW9JfXbQjRZu

Malware Config

Targets

    • Target

      Brawl Stars.apk

    • Size

      10.2MB

    • MD5

      e97b039ac6da62957451a4f624a61ed7

    • SHA1

      a09b5d2e8d35ac7f8b3cac421f88774c220c1b42

    • SHA256

      e24fea12d4dda1228d1c31e2318bebc9cdc8e146aee900e69d6f691838cdb59c

    • SHA512

      d1ebf4669e02e627c64c12eaeb89e4fc4625d43c86f8fe56bbf6794c1b2c6c244ded2978c496eca5c8da255ca78fd45f080ec243740a9782e34f3ffe91fd2312

    • SSDEEP

      196608:PcXuU9Y5MoTubltQHFiuBEWVPT+VUWh/fZpjIAHI2eyhriYH1QQmW10Y4gkGuX98:Ee6oS7Qo+LVW9JfXbQjRZu

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks