General

  • Target

    AndChecker.apk

  • Size

    8.5MB

  • Sample

    241123-bt375szqcn

  • MD5

    3e22fa7e6838639f6fc593d4e87e5c8c

  • SHA1

    4f3399ebd5e090a6089c2012254ccd78c054e620

  • SHA256

    7178832f203c705a977f6a9da477d862bdc1bbe893d50266473f010eacd640c5

  • SHA512

    0ebf21b7f5777a4dccbe5c8fa3b236151575b09e5430ccf771bf4686078b5c95a314b3bf12522a5fd7b4dd4a7b45fd87afdf5cbe1bc6927ccd445c512858af65

  • SSDEEP

    196608:Y/fZptcXuYUm01PAmsxwnK8NyvsIgXnEoEmkSoewsTBMJ03XAM:2fieYO1PWwnK+lnpZ+stMJYX1

Malware Config

Targets

    • Target

      AndChecker.apk

    • Size

      8.5MB

    • MD5

      3e22fa7e6838639f6fc593d4e87e5c8c

    • SHA1

      4f3399ebd5e090a6089c2012254ccd78c054e620

    • SHA256

      7178832f203c705a977f6a9da477d862bdc1bbe893d50266473f010eacd640c5

    • SHA512

      0ebf21b7f5777a4dccbe5c8fa3b236151575b09e5430ccf771bf4686078b5c95a314b3bf12522a5fd7b4dd4a7b45fd87afdf5cbe1bc6927ccd445c512858af65

    • SSDEEP

      196608:Y/fZptcXuYUm01PAmsxwnK8NyvsIgXnEoEmkSoewsTBMJ03XAM:2fieYO1PWwnK+lnpZ+stMJYX1

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks