General

  • Target

    PowerWarriors17.6.apk

  • Size

    173.8MB

  • Sample

    240630-jalsravdje

  • MD5

    84577b06f47f89f0be6cf65599790fd8

  • SHA1

    a5e055a054a0296a5e71e0e21333eb101a5a5ee0

  • SHA256

    cc4697f65ba2ac587ab99c8ee45aeacdf58e7aaf60129c10d3cd96210f611efb

  • SHA512

    435d2fe2e31da4b77d275029b295e76fe437487d9c77b4310d84dd9eba0017e5b066d56282fd7b8c200715cb29dce82b29f89eb93fc1191d44e5dae6caeda291

  • SSDEEP

    3145728:ic7Vx1OQPHaA63OIOPfRM3Wx5VT41eSUU1KuuJy2qqCJppHcZmAEaVnj:fK3OzG3Wx5B4sSUUolJFpCJpJcZmTaVj

Malware Config

Targets

    • Target

      PowerWarriors17.6.apk

    • Size

      173.8MB

    • MD5

      84577b06f47f89f0be6cf65599790fd8

    • SHA1

      a5e055a054a0296a5e71e0e21333eb101a5a5ee0

    • SHA256

      cc4697f65ba2ac587ab99c8ee45aeacdf58e7aaf60129c10d3cd96210f611efb

    • SHA512

      435d2fe2e31da4b77d275029b295e76fe437487d9c77b4310d84dd9eba0017e5b066d56282fd7b8c200715cb29dce82b29f89eb93fc1191d44e5dae6caeda291

    • SSDEEP

      3145728:ic7Vx1OQPHaA63OIOPfRM3Wx5VT41eSUU1KuuJy2qqCJppHcZmAEaVnj:fK3OzG3Wx5B4sSUUolJFpCJpJcZmTaVj

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks