General

  • Target

    build.s.apk

  • Size

    346KB

  • Sample

    240503-lvbvdsdh46

  • MD5

    83df4ac5ea51422f75145ac2d95c7b18

  • SHA1

    c4f8405308257b7f669d49e92fab7484c6db35a3

  • SHA256

    c854db64b9926947cb0f82d53e0dcd775f644e5c5d5a15133d03cc194e1c9689

  • SHA512

    d22c271964349133a095d01c9eae03488ae59bc2c736d315f43115f93caf751b5e5784aa5ab1f04793bf4af91d5347ebe50692cb5f01743b6474476e92834ffa

  • SSDEEP

    6144:cEPXpltG9Yqym29Fdb7Nsyjx0Vc0nfIE4JTDyq2PQrqON5Oe0HWn/rMDxobB:cERltGuqyjJbGEac0n1kDmPQrLNwe0HC

Malware Config

Extracted

Family

ahmyth

C2

http://212.227.241.124:22222

Targets

    • Target

      build.s.apk

    • Size

      346KB

    • MD5

      83df4ac5ea51422f75145ac2d95c7b18

    • SHA1

      c4f8405308257b7f669d49e92fab7484c6db35a3

    • SHA256

      c854db64b9926947cb0f82d53e0dcd775f644e5c5d5a15133d03cc194e1c9689

    • SHA512

      d22c271964349133a095d01c9eae03488ae59bc2c736d315f43115f93caf751b5e5784aa5ab1f04793bf4af91d5347ebe50692cb5f01743b6474476e92834ffa

    • SSDEEP

      6144:cEPXpltG9Yqym29Fdb7Nsyjx0Vc0nfIE4JTDyq2PQrqON5Oe0HWn/rMDxobB:cERltGuqyjJbGEac0n1kDmPQrLNwe0HC

    • Removes its main activity from the application launcher

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks