General

  • Target

    checkbox_ingenico_common_prod_release_v0.8.61-paylink.SIGNED.apk

  • Size

    58.0MB

  • Sample

    241111-lyafqsxhlf

  • MD5

    18e2722020ec2fc60106838b391885af

  • SHA1

    10a5e4be4115ee5a827728097910ba2f09cd88ef

  • SHA256

    ce92fe435c7905c4e2d08d898305b881681860ac4017beec1bc781b395ec3cd5

  • SHA512

    c590d0c286cb1341322c775a85e46c42e8dc98971f201f2dc82e25cea93cc56985280d018a5a61a771814963682f7a7e73a711b00fa8eac1bcb45b7aa7090970

  • SSDEEP

    1572864:w261e3g9ZOnnin1j1nIQzl8A32zpUVUZwc8aPHfk4Un:wI3qZk81N8A32zpUVuwa/qn

Malware Config

Targets

    • Target

      checkbox_ingenico_common_prod_release_v0.8.61-paylink.SIGNED.apk

    • Size

      58.0MB

    • MD5

      18e2722020ec2fc60106838b391885af

    • SHA1

      10a5e4be4115ee5a827728097910ba2f09cd88ef

    • SHA256

      ce92fe435c7905c4e2d08d898305b881681860ac4017beec1bc781b395ec3cd5

    • SHA512

      c590d0c286cb1341322c775a85e46c42e8dc98971f201f2dc82e25cea93cc56985280d018a5a61a771814963682f7a7e73a711b00fa8eac1bcb45b7aa7090970

    • SSDEEP

      1572864:w261e3g9ZOnnin1j1nIQzl8A32zpUVUZwc8aPHfk4Un:wI3qZk81N8A32zpUVuwa/qn

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks