General

  • Target

    eafbbd718e316e4dbbb8c0202c688c8b4d6169573aba8b5b3080238cc80068ed

  • Size

    1.5MB

  • Sample

    240425-nd7lvaab72

  • MD5

    3c0823a060df3dd0fe7fa84bf7de7ebf

  • SHA1

    bc0dde1e2b355c4df375b72521fe856d27f23809

  • SHA256

    eafbbd718e316e4dbbb8c0202c688c8b4d6169573aba8b5b3080238cc80068ed

  • SHA512

    09c91722a5ab2575da046d8f36833507e00503396564b69bed9476caa1e93eed4c2e1acc9346747ffe8d47d427a830bef169ef206337ec0e2e8744a0c4b239b4

  • SSDEEP

    24576:tgug+VbnCmFnLkeRuULmX5dlV/9vDZKuZs8pukYznG0WAN4C7Eo1X:tgr+lnPnLBRuU6rlvVK8s8pukOnG0W1c

Malware Config

Targets

    • Target

      No confirmado 963920.crdownload

    • Size

      1.6MB

    • MD5

      b8c746cf54cd01255b789e6b310471e3

    • SHA1

      c49629ec84a0bbc6657ba1f14dc45736dd7d83c1

    • SHA256

      4254a12f4154f46c33f067f5d2797f41592e71443e04c69731633b5dc45ef901

    • SHA512

      eafb19bb5cfb5ccfb9acd6231f6cea30938073d7b977c74e2007e5416fbf4449e493f1e3da9155d8600cf04b5803e50a31044199874efea9ebf74130f3ca8406

    • SSDEEP

      24576:PRHUg+zbn+CFnNHVsM6QrmXXllHltvDQ6S9H/wEhpMjQ4OFXiWV7ALtmX99Q:JHh+nn7nNHVsDQa7Pv86SHrmiLCLtmHQ

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks