Resubmissions

08/05/2025, 17:11

250508-vqej6atvht 8

General

  • Target

    JokesPhone.apk

  • Size

    8.3MB

  • Sample

    250508-vqej6atvht

  • MD5

    617d8eba8f639c22b886ba6b32005cb7

  • SHA1

    88abe3cc6dfff69916f55e02b97dd762ed450a3f

  • SHA256

    bab68939362d86f4748350c4cccec652ff656ca34cd2df63d239c8debe3dc7a1

  • SHA512

    e92684cf493c02ce5e87f5383e2e974204363231300eb6ce1b86e079493469adaf40cc8fb1976766939f9a56ca8f9605b6c8f03fe5cbd1e82cc17360190c82a0

  • SSDEEP

    196608:ZB66xcLC3pAeO9efol1y8FyglJIDMmHjlIxzyPTgPbTH:ZvEXzjUDFAzgTo

Malware Config

Targets

    • Target

      JokesPhone.apk

    • Size

      8.3MB

    • MD5

      617d8eba8f639c22b886ba6b32005cb7

    • SHA1

      88abe3cc6dfff69916f55e02b97dd762ed450a3f

    • SHA256

      bab68939362d86f4748350c4cccec652ff656ca34cd2df63d239c8debe3dc7a1

    • SHA512

      e92684cf493c02ce5e87f5383e2e974204363231300eb6ce1b86e079493469adaf40cc8fb1976766939f9a56ca8f9605b6c8f03fe5cbd1e82cc17360190c82a0

    • SSDEEP

      196608:ZB66xcLC3pAeO9efol1y8FyglJIDMmHjlIxzyPTgPbTH:ZvEXzjUDFAzgTo

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v16

Tasks

OSZAR »