General

  • Target

    MOD PUBG MOBILE FREE NO PW V3.4.apk

  • Size

    104.1MB

  • Sample

    241110-r7p6fayeqm

  • MD5

    779385481f2328010b519a37a7b594c0

  • SHA1

    4d987e785e3bdce4589a151c1997dfd660b962b8

  • SHA256

    c120e0e61b844ccb1dff2ff462e11631506bcbd26f994cf2ff46a72117a7b075

  • SHA512

    6985750c276bfaefa64177dc236019989405a3e2939768751b2cb00963322adde27545e010d38db5611eb9492556e0b01f26df1e4f70b97dfff5a5d3bbdd2de1

  • SSDEEP

    3145728:cT2wqFY5djlDr3X5NeOzEre/4n5EYE4sz7MF:OwFy1r3XjPs75EYEJ8

Malware Config

Targets

    • Target

      MOD PUBG MOBILE FREE NO PW V3.4.apk

    • Size

      104.1MB

    • MD5

      779385481f2328010b519a37a7b594c0

    • SHA1

      4d987e785e3bdce4589a151c1997dfd660b962b8

    • SHA256

      c120e0e61b844ccb1dff2ff462e11631506bcbd26f994cf2ff46a72117a7b075

    • SHA512

      6985750c276bfaefa64177dc236019989405a3e2939768751b2cb00963322adde27545e010d38db5611eb9492556e0b01f26df1e4f70b97dfff5a5d3bbdd2de1

    • SSDEEP

      3145728:cT2wqFY5djlDr3X5NeOzEre/4n5EYE4sz7MF:OwFy1r3XjPs75EYEJ8

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks