General

  • Target

    appvn.apk

  • Size

    12.2MB

  • Sample

    241018-lqltsszdnf

  • MD5

    7de190fa19ca6bb29a45323d42c3ed20

  • SHA1

    cc16155facdf63692be605fdeb3f066939f79eae

  • SHA256

    7a33f6ba38ef7c0722078fc0340ce2a68349419454b738e57645dac8f1eb2b31

  • SHA512

    1a3c5b8a2d67fa9da5e155a828c154a0654a9db816116c691cc774a7ab7b097cc9c41f1b6b2f81cca2fbb184998e4e6387086b4445afbf5b7147db27ddcdd142

  • SSDEEP

    393216:KNfmPcE1lHNbrqDUb7Q6GTkIF4DMvz2r/EzmjX:KNOPcE15xO4IX7zY/Ezq

Malware Config

Targets

    • Target

      appvn.apk

    • Size

      12.2MB

    • MD5

      7de190fa19ca6bb29a45323d42c3ed20

    • SHA1

      cc16155facdf63692be605fdeb3f066939f79eae

    • SHA256

      7a33f6ba38ef7c0722078fc0340ce2a68349419454b738e57645dac8f1eb2b31

    • SHA512

      1a3c5b8a2d67fa9da5e155a828c154a0654a9db816116c691cc774a7ab7b097cc9c41f1b6b2f81cca2fbb184998e4e6387086b4445afbf5b7147db27ddcdd142

    • SSDEEP

      393216:KNfmPcE1lHNbrqDUb7Q6GTkIF4DMvz2r/EzmjX:KNOPcE15xO4IX7zY/Ezq

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks