General

  • Target

    sh.ppy.osulazer.apk

  • Size

    215.0MB

  • Sample

    250203-aaak2svlfn

  • MD5

    a22ca5d3391931d7f4e602380da7c60f

  • SHA1

    b5d80e4f458db8dcc65506194fc36642f03bd49a

  • SHA256

    1ea11e37eed039b132147b7b5f58a52527e8d4b6936822348cc0db52de1d7dcc

  • SHA512

    c55fdf6d1afc6072954469fb82dc2a5b555d51c948923d8012752326f2e6a0d61b4a562aaf489f9cdf7fa06fddca8422c610c0a31fbd308a56e737057a681d1e

  • SSDEEP

    6291456:uHCLaPTVJqbqyI+GJQeQ0RAlry6h6bFGVHGA:uHlPvqbheYftL

Malware Config

Targets

    • Target

      sh.ppy.osulazer.apk

    • Size

      215.0MB

    • MD5

      a22ca5d3391931d7f4e602380da7c60f

    • SHA1

      b5d80e4f458db8dcc65506194fc36642f03bd49a

    • SHA256

      1ea11e37eed039b132147b7b5f58a52527e8d4b6936822348cc0db52de1d7dcc

    • SHA512

      c55fdf6d1afc6072954469fb82dc2a5b555d51c948923d8012752326f2e6a0d61b4a562aaf489f9cdf7fa06fddca8422c610c0a31fbd308a56e737057a681d1e

    • SSDEEP

      6291456:uHCLaPTVJqbqyI+GJQeQ0RAlry6h6bFGVHGA:uHlPvqbheYftL

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks