General

  • Target

    rovio-classics-angry-birds-v1.1.1408.apk

  • Size

    98.9MB

  • Sample

    240909-3ajg6svgnr

  • MD5

    c279b887e26e1715be53b8d5d530994a

  • SHA1

    3db170fb6951f04acc903c3a9aa3540af3d1aecc

  • SHA256

    3761ece4537efd4399e9233a11b1e813c91dc2111ae012a7ed7aa7a521219116

  • SHA512

    0156776157c3db30f74a9693fe2c79a0e384950db9b5b683fc84248c29bd2c8ef8455af41b42d9f031217310fa53c7269bb487f97ccbb4d43be72cacc2045613

  • SSDEEP

    3145728:D6DLAAafvVbVZ4zKeZBHVdjffQZ6RWpwZ2nS0:D6UdbVZ4zKepdjHQZ6RWpwAp

Malware Config

Targets

    • Target

      rovio-classics-angry-birds-v1.1.1408.apk

    • Size

      98.9MB

    • MD5

      c279b887e26e1715be53b8d5d530994a

    • SHA1

      3db170fb6951f04acc903c3a9aa3540af3d1aecc

    • SHA256

      3761ece4537efd4399e9233a11b1e813c91dc2111ae012a7ed7aa7a521219116

    • SHA512

      0156776157c3db30f74a9693fe2c79a0e384950db9b5b683fc84248c29bd2c8ef8455af41b42d9f031217310fa53c7269bb487f97ccbb4d43be72cacc2045613

    • SSDEEP

      3145728:D6DLAAafvVbVZ4zKeZBHVdjffQZ6RWpwZ2nS0:D6UdbVZ4zKepdjHQZ6RWpwAp

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks