General

  • Target

    e05defa5261ef82a332a39685ec405516e7080c4cd550422a2db38e47922055b.bin

  • Size

    3.4MB

  • Sample

    240511-1yvt1adh95

  • MD5

    020607325599ddbfb956f1e4b9723065

  • SHA1

    a068a8eff52a8a75faa3cf934ef5633d76840f49

  • SHA256

    e05defa5261ef82a332a39685ec405516e7080c4cd550422a2db38e47922055b

  • SHA512

    e77a7a719422b332e666a876f5d856e47173c439d849a25d21715a6dbda9fd6c4396a0934bbbc7fcf0aec04099f208733d3e288ad19cb0713e70c0523cdbd15b

  • SSDEEP

    98304:C1+hKSo6QcUiaUToTwr5L6l03meemCThQ08uQxW4ta:C1WKSo6qiPe026094c

Malware Config

Targets

    • Target

      e05defa5261ef82a332a39685ec405516e7080c4cd550422a2db38e47922055b.bin

    • Size

      3.4MB

    • MD5

      020607325599ddbfb956f1e4b9723065

    • SHA1

      a068a8eff52a8a75faa3cf934ef5633d76840f49

    • SHA256

      e05defa5261ef82a332a39685ec405516e7080c4cd550422a2db38e47922055b

    • SHA512

      e77a7a719422b332e666a876f5d856e47173c439d849a25d21715a6dbda9fd6c4396a0934bbbc7fcf0aec04099f208733d3e288ad19cb0713e70c0523cdbd15b

    • SSDEEP

      98304:C1+hKSo6QcUiaUToTwr5L6l03meemCThQ08uQxW4ta:C1WKSo6qiPe026094c

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks