General

  • Target

    PVZ-Fusion-2.0.4.apk

  • Size

    924.5MB

  • Sample

    240930-z6zx9awanm

  • MD5

    b7fd91c5dc10c5b3946527b0cfc5c2c9

  • SHA1

    3496e3e97cf01aec83384f39ac4fa12885c32dfe

  • SHA256

    ff5bfc5b3850b58c07998179c8c2476200d48500dab68b9673e2464c7740476d

  • SHA512

    5cfb632f1dea992b99c91852debd2618cdb9dd1551054305c07a03680a042cdf4092efccf8e11a017be7886db9c269f94c47656c5068ab6d0626582e7cfb24c9

  • SSDEEP

    25165824:9JcmvQMg4b4YWethER+ojqVJ5mRlTnOhgsD/R:XDg4b42h0+kqVSlKDp

Malware Config

Targets

    • Target

      PVZ-Fusion-2.0.4.apk

    • Size

      924.5MB

    • MD5

      b7fd91c5dc10c5b3946527b0cfc5c2c9

    • SHA1

      3496e3e97cf01aec83384f39ac4fa12885c32dfe

    • SHA256

      ff5bfc5b3850b58c07998179c8c2476200d48500dab68b9673e2464c7740476d

    • SHA512

      5cfb632f1dea992b99c91852debd2618cdb9dd1551054305c07a03680a042cdf4092efccf8e11a017be7886db9c269f94c47656c5068ab6d0626582e7cfb24c9

    • SSDEEP

      25165824:9JcmvQMg4b4YWethER+ojqVJ5mRlTnOhgsD/R:XDg4b42h0+kqVSlKDp

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Target

      app.png

    • Size

      52.0MB

    • MD5

      49050b0de7fe433bbbc551d0629c92c0

    • SHA1

      9ce726b45635ccd4c94d8a8faefc0a181e69d022

    • SHA256

      bfc46fc40856d7d7dc640843db93d3190e492e4489628299c304ed9530c3014f

    • SHA512

      856c7182890b277b491d589707fdfcd627929271ad386dcd65abb83f77857bd05e2758ad5f6d81ad468a31671308c90586f1c344e44faca9e9863d0e6dddf700

    • SSDEEP

      786432:uBDzyC2aE8j8b06lfN868CkmhrRJgVIdsySu/UztBhUYJ9RqSGlnmfJrQdIU:uBDzyC2aE8wb06lJhrRetqPmRrQdIU

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks