General

  • Target

    DuckVision.apk

  • Size

    10.7MB

  • Sample

    240921-yrlxeazhmf

  • MD5

    1668946c755ca2986314ed9c55bc7579

  • SHA1

    b61afbbf307d0d2290ebeaec7f306d0214a5b062

  • SHA256

    29e56b9f22cace295ddaf5c4279cb0cdbfe406c5451aef31393a1cdf8aadfd4e

  • SHA512

    f5f5282718552300094fd659be420f6b353ea172806add67c60f78362ab0dd01b0fbf0e41b8d66240948c7ede09e3f4943a98a8fb74c595251e71814ec00ac55

  • SSDEEP

    196608:RaPcPJwR1jqtXisHNsNF8On3hi4UOzKe8kKh4Nz4iWRQ:Ra0iR1GtXi2WqufIeKo4y

Malware Config

Targets

    • Target

      DuckVision.apk

    • Size

      10.7MB

    • MD5

      1668946c755ca2986314ed9c55bc7579

    • SHA1

      b61afbbf307d0d2290ebeaec7f306d0214a5b062

    • SHA256

      29e56b9f22cace295ddaf5c4279cb0cdbfe406c5451aef31393a1cdf8aadfd4e

    • SHA512

      f5f5282718552300094fd659be420f6b353ea172806add67c60f78362ab0dd01b0fbf0e41b8d66240948c7ede09e3f4943a98a8fb74c595251e71814ec00ac55

    • SSDEEP

      196608:RaPcPJwR1jqtXisHNsNF8On3hi4UOzKe8kKh4Nz4iWRQ:Ra0iR1GtXi2WqufIeKo4y

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks