General

  • Target

    TASKMANAGER.apk

  • Size

    256KB

  • Sample

    240426-y4vebabd68

  • MD5

    20d8603314a52b75dad2a577ef785063

  • SHA1

    52a1c165f0346198f1c7af72a964b59df98b2672

  • SHA256

    41419a535e1492f32751e19db78bd1f71736b6d3e51fd93feeb65fad36497367

  • SHA512

    6b15cc190ac09620170afea44c5354472166b1483364b231745bd4d6b1a7f47782f74f69f65e2852d843ee9fcf5470c61cc1d6d3a64b1b9a740f24e585cc08b0

  • SSDEEP

    6144:Gtr/W679Wl+MJR2mEvLWFmglzdiIvBSJI7HarCcgxsA:GH9W1AzglzNJ+I7a0xJ

Malware Config

Extracted

Family

ahmyth

C2

http://40.60.80.100:2233

Targets

    • Target

      TASKMANAGER.apk

    • Size

      256KB

    • MD5

      20d8603314a52b75dad2a577ef785063

    • SHA1

      52a1c165f0346198f1c7af72a964b59df98b2672

    • SHA256

      41419a535e1492f32751e19db78bd1f71736b6d3e51fd93feeb65fad36497367

    • SHA512

      6b15cc190ac09620170afea44c5354472166b1483364b231745bd4d6b1a7f47782f74f69f65e2852d843ee9fcf5470c61cc1d6d3a64b1b9a740f24e585cc08b0

    • SSDEEP

      6144:Gtr/W679Wl+MJR2mEvLWFmglzdiIvBSJI7HarCcgxsA:GH9W1AzglzNJ+I7a0xJ

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Matrix

Tasks