General

  • Target

    one.apk

  • Size

    7.7MB

  • Sample

    241110-m1wmeswaqb

  • MD5

    d55b4144c8fd49874e211c5f202835ec

  • SHA1

    8afc38d0ee5ac2854d9dae63d1f075654b0dbe14

  • SHA256

    70796fbe34ee7cb73c700f6a817b133ad95727543aef6c992182ec144cc92e5d

  • SHA512

    593457518ec0d62f70e7b37f11d84d2f131f3263f6bb940c43c4d5438ebdf56441c820988607f66174ac429609e9fe188c6ac0097cb570ed9c730bc75514233f

  • SSDEEP

    196608:pr4lU2ceS9+PwE1xsuc6P3bXwlOtluPsUKDptefRc:pi3BIE1xfb+sUq6c

Malware Config

Targets

    • Target

      one.apk

    • Size

      7.7MB

    • MD5

      d55b4144c8fd49874e211c5f202835ec

    • SHA1

      8afc38d0ee5ac2854d9dae63d1f075654b0dbe14

    • SHA256

      70796fbe34ee7cb73c700f6a817b133ad95727543aef6c992182ec144cc92e5d

    • SHA512

      593457518ec0d62f70e7b37f11d84d2f131f3263f6bb940c43c4d5438ebdf56441c820988607f66174ac429609e9fe188c6ac0097cb570ed9c730bc75514233f

    • SSDEEP

      196608:pr4lU2ceS9+PwE1xsuc6P3bXwlOtluPsUKDptefRc:pi3BIE1xfb+sUq6c

    • Checks Android system properties for emulator presence.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks