General

  • Target

    pixellab-1-9-7.apk

  • Size

    28.8MB

  • Sample

    240912-zx46lsvfqh

  • MD5

    604a287f9719c70771698c85426f7148

  • SHA1

    9d364f6cbe18db1281186d2fe53c8edbd6d41c50

  • SHA256

    7115c85eb5c7bcd35376015d3af8fb6f22976953acd1581c6977d255eaf57dd7

  • SHA512

    5e6de33d716dba54a2353292553d2463fd7a6cd732ca8a945e8decfc533eb64ac9f4c0f4a6f9da435b473b2c622f3c9029e1549397ad3f1af62808311bfe7456

  • SSDEEP

    786432:qEjEEM0OOOOOOE8/jId2OM4xAbLYPM72bmii:qEjzM0OOOOOOE8/UdTWbLYk7qmz

Malware Config

Targets

    • Target

      pixellab-1-9-7.apk

    • Size

      28.8MB

    • MD5

      604a287f9719c70771698c85426f7148

    • SHA1

      9d364f6cbe18db1281186d2fe53c8edbd6d41c50

    • SHA256

      7115c85eb5c7bcd35376015d3af8fb6f22976953acd1581c6977d255eaf57dd7

    • SHA512

      5e6de33d716dba54a2353292553d2463fd7a6cd732ca8a945e8decfc533eb64ac9f4c0f4a6f9da435b473b2c622f3c9029e1549397ad3f1af62808311bfe7456

    • SSDEEP

      786432:qEjEEM0OOOOOOE8/jId2OM4xAbLYPM72bmii:qEjzM0OOOOOOE8/UdTWbLYk7qmz

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks