General

  • Target

    com.wg.xvideos.app-0.64-free.apk

  • Size

    3.8MB

  • Sample

    250508-w5d3lshp9t

  • MD5

    93098ec609b39e535c26a8149a8162b7

  • SHA1

    217e9a929d68cca7b621d8951a1ed049b843f16b

  • SHA256

    aabe4e1c90e4b87ab586282ada58a58ff9b140f569bb91a1d60e618facb99ead

  • SHA512

    519d1f96bc6e5bd68061a49fa640f90dd4ca6559092f0fdab65981f5fd8a47a6e1684d488da6336ec2fb24062644ad4d3159e79fbb1d5a2c760bd5292c1ee83c

  • SSDEEP

    98304:6Ri/81f6xvLyvRw7Tx+Glm9aJRwZoR5EJB3n/JrSilfX:6PiFLyvO7Tx7lm9URwZSqJB3n/pd

Malware Config

Targets

    • Target

      com.wg.xvideos.app-0.64-free.apk

    • Size

      3.8MB

    • MD5

      93098ec609b39e535c26a8149a8162b7

    • SHA1

      217e9a929d68cca7b621d8951a1ed049b843f16b

    • SHA256

      aabe4e1c90e4b87ab586282ada58a58ff9b140f569bb91a1d60e618facb99ead

    • SHA512

      519d1f96bc6e5bd68061a49fa640f90dd4ca6559092f0fdab65981f5fd8a47a6e1684d488da6336ec2fb24062644ad4d3159e79fbb1d5a2c760bd5292c1ee83c

    • SSDEEP

      98304:6Ri/81f6xvLyvRw7Tx+Glm9aJRwZoR5EJB3n/JrSilfX:6PiFLyvO7Tx7lm9URwZSqJB3n/pd

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v16

Tasks

OSZAR »