General

  • Target

    Logseq-android-0.10.9.apk

  • Size

    32.6MB

  • Sample

    241031-knmsmswpam

  • MD5

    947518cc7653a222469ad6f3891b52e8

  • SHA1

    87baeeca6bfd09e9c1e0abf344de1b6a0c01085e

  • SHA256

    938798825b9b7e0f64040ccf476fe9e6afb71fd20824e25d9fc3f3f79af32ecb

  • SHA512

    4d79dc6b8f71d87b62a7b4d2738a9cf43be408546cde07e849650e02f54fd0be816afffb51d3a88574eb4c35623cb321b09bbbb297ab14f4dc96a9458bb031ec

  • SSDEEP

    786432:dbbMNnp0+uz2l84kEgA1w2RYNa50PlApzdA27VNa6:dbANnp5S4GATqNaSPb6

Malware Config

Targets

    • Target

      Logseq-android-0.10.9.apk

    • Size

      32.6MB

    • MD5

      947518cc7653a222469ad6f3891b52e8

    • SHA1

      87baeeca6bfd09e9c1e0abf344de1b6a0c01085e

    • SHA256

      938798825b9b7e0f64040ccf476fe9e6afb71fd20824e25d9fc3f3f79af32ecb

    • SHA512

      4d79dc6b8f71d87b62a7b4d2738a9cf43be408546cde07e849650e02f54fd0be816afffb51d3a88574eb4c35623cb321b09bbbb297ab14f4dc96a9458bb031ec

    • SSDEEP

      786432:dbbMNnp0+uz2l84kEgA1w2RYNa50PlApzdA27VNa6:dbANnp5S4GATqNaSPb6

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks