General

  • Target

    devices-tycoon-androeed.store-0-1727048296.apk

  • Size

    70.7MB

  • Sample

    241110-bp49msvrdx

  • MD5

    22f99e46dea7f302e8efffdbbb74f67f

  • SHA1

    fc0989813bc009bebeae78cc3472bf76287d6903

  • SHA256

    c55f58a0a9262f7a009e30934e5f8ba8a967eee96cf6e835785371e0dd4240cd

  • SHA512

    ff21fd985bbfa601c4258e8d3f94967a00becb0a8c7e72584dd401507fb04851fe695a6fc4020f14d4fbbfbe7ca1aa4de3a15d106554529ba3b81674d932e626

  • SSDEEP

    1572864:e/SW3HCmgCMtY8EuH42DwnXL1MAiGRUUuQkYOwS:DW3HCPtY8E72yXL7itUuQxOwS

Malware Config

Targets

    • Target

      devices-tycoon-androeed.store-0-1727048296.apk

    • Size

      70.7MB

    • MD5

      22f99e46dea7f302e8efffdbbb74f67f

    • SHA1

      fc0989813bc009bebeae78cc3472bf76287d6903

    • SHA256

      c55f58a0a9262f7a009e30934e5f8ba8a967eee96cf6e835785371e0dd4240cd

    • SHA512

      ff21fd985bbfa601c4258e8d3f94967a00becb0a8c7e72584dd401507fb04851fe695a6fc4020f14d4fbbfbe7ca1aa4de3a15d106554529ba3b81674d932e626

    • SSDEEP

      1572864:e/SW3HCmgCMtY8EuH42DwnXL1MAiGRUUuQkYOwS:DW3HCPtY8E72yXL7itUuQxOwS

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks