General

  • Target

    freshcut-5-13-4.apk

  • Size

    83.4MB

  • Sample

    240811-ysvkyavhnq

  • MD5

    dae570c9dd974f435de88c4432d536a7

  • SHA1

    a6b8eeb09e464e0136f1ea75fb4820cf6bc423dd

  • SHA256

    9627f1c83cdc9a55d6419aaa6bf30b4867033677a46d98462e4d858a9916d972

  • SHA512

    23bbbd1b4645fd100dbe0488c2674ddf779cbf727aab43d6f4fa9b3d054707531adf978029a915cbe1f15af7cec8923e554ad4d4a9e85eef1fe3aea974940a95

  • SSDEEP

    1572864:aVHiXAqtu2NEauMTgQjriAYKLqAaaDWAZalBzUWJa0yT7BNm5ZyNc/d5v4HVWVwo:aMAZ25jriZiDWAZ+BzUmkBoSW/d5vQWP

Malware Config

Targets

    • Target

      freshcut-5-13-4.apk

    • Size

      83.4MB

    • MD5

      dae570c9dd974f435de88c4432d536a7

    • SHA1

      a6b8eeb09e464e0136f1ea75fb4820cf6bc423dd

    • SHA256

      9627f1c83cdc9a55d6419aaa6bf30b4867033677a46d98462e4d858a9916d972

    • SHA512

      23bbbd1b4645fd100dbe0488c2674ddf779cbf727aab43d6f4fa9b3d054707531adf978029a915cbe1f15af7cec8923e554ad4d4a9e85eef1fe3aea974940a95

    • SSDEEP

      1572864:aVHiXAqtu2NEauMTgQjriAYKLqAaaDWAZalBzUWJa0yT7BNm5ZyNc/d5v4HVWVwo:aMAZ25jriZiDWAZ+BzUmkBoSW/d5vQWP

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks