General

  • Target

    OnePlayer_1.2_APKPure.apk

  • Size

    7.5MB

  • Sample

    241110-m9yhdavhqj

  • MD5

    6ddbc371fa3b2fc5228e0428b17d3cf6

  • SHA1

    b15da4fe4acb5da38741507ca25d46af14aea1a9

  • SHA256

    3cacfba713f28437ceaebb97b75cf37850cbe4a0c4834f1c592a57d766bafcf8

  • SHA512

    9e39140d1edd3bab1ac5ac2aeaca1adcae33c1c091851de144415876ad1c958e16440bccdf6b2dc550d49ccfb5e45857e08f74b85c8885448b46a9c243bd72bd

  • SSDEEP

    196608:gr4lU2ceS9+P9lOtluPsUKDptefViX0+3u4P/c:gi3BSb+sUqgvr

Malware Config

Targets

    • Target

      OnePlayer_1.2_APKPure.apk

    • Size

      7.5MB

    • MD5

      6ddbc371fa3b2fc5228e0428b17d3cf6

    • SHA1

      b15da4fe4acb5da38741507ca25d46af14aea1a9

    • SHA256

      3cacfba713f28437ceaebb97b75cf37850cbe4a0c4834f1c592a57d766bafcf8

    • SHA512

      9e39140d1edd3bab1ac5ac2aeaca1adcae33c1c091851de144415876ad1c958e16440bccdf6b2dc550d49ccfb5e45857e08f74b85c8885448b46a9c243bd72bd

    • SSDEEP

      196608:gr4lU2ceS9+P9lOtluPsUKDptefViX0+3u4P/c:gi3BSb+sUqgvr

    • Checks Android system properties for emulator presence.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.