General

  • Target

    com-penly-penly-1-59663159-a525ca6bee55a553d26453f2258e3b4a.apk

  • Size

    6.9MB

  • Sample

    241209-b7efyaxnbv

  • MD5

    a525ca6bee55a553d26453f2258e3b4a

  • SHA1

    0c88993bccb5f2ed0db36bea1b10910ba7b9b902

  • SHA256

    7fb82e43ab929fe5f0ee60a07876010cec4fd176d5e8bff876a5101a36567636

  • SHA512

    a689cd326a9038a4013c46fe58502f7b4002164025b90de8e3ff0c4bf444ec7d66bab90ee454bfee7b1d6659c371cc547ddff36ac9c12bc078aeda63d8a784d7

  • SSDEEP

    98304:LzfrHKXNei+kL/d/HxtS2jUxSOpzlf0Ot2T97u4NIFtEaiWONpY9m5+hlPqb212q:IsiDFHxtop7uZ2E9WOnYY4XY7pK

Malware Config

Targets

    • Target

      com-penly-penly-1-59663159-a525ca6bee55a553d26453f2258e3b4a.apk

    • Size

      6.9MB

    • MD5

      a525ca6bee55a553d26453f2258e3b4a

    • SHA1

      0c88993bccb5f2ed0db36bea1b10910ba7b9b902

    • SHA256

      7fb82e43ab929fe5f0ee60a07876010cec4fd176d5e8bff876a5101a36567636

    • SHA512

      a689cd326a9038a4013c46fe58502f7b4002164025b90de8e3ff0c4bf444ec7d66bab90ee454bfee7b1d6659c371cc547ddff36ac9c12bc078aeda63d8a784d7

    • SSDEEP

      98304:LzfrHKXNei+kL/d/HxtS2jUxSOpzlf0Ot2T97u4NIFtEaiWONpY9m5+hlPqb212q:IsiDFHxtop7uZ2E9WOnYY4XY7pK

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests cell location

      Uses Android APIs to to get current cell information.

MITRE ATT&CK Mobile v15

Tasks