General

  • Target

    fadb7686d81a1bfb3029f33fd08de4ce26402d93b3be30a1f661befac197b811

  • Size

    2.7MB

  • Sample

    240517-gms2gscd4s

  • MD5

    482e9bf74ad28e437b1a3e83b15ebaa9

  • SHA1

    55c18cf081a454af1ec712bf7d766a8c6141df0e

  • SHA256

    fadb7686d81a1bfb3029f33fd08de4ce26402d93b3be30a1f661befac197b811

  • SHA512

    592366bb609870f5d8141ddffbb00b08e8dca20127620a134390438f3a549828cd2f4b6f4fc7cf6d0914929c653a36caa357c3121e6e0d13b20003486aeae4ba

  • SSDEEP

    49152:A+rToGOekeA3i9R6IByivdDWs8XtSmLVTYe4FqMovUNmtQkTuM4:jjTi3i9AIByi1DcXtSSTYTFqFU02kCM4

Malware Config

Targets

    • Target

      1ef0c4d0484f9c859cc0e61223d71579a817736bf741bc6001dab472a95c56b2.apk

    • Size

      2.8MB

    • MD5

      83ae44741a62282a0133cbbda73cb65f

    • SHA1

      d2ed103e8aa54981b02eba1bd20039dcc4c3d945

    • SHA256

      1ef0c4d0484f9c859cc0e61223d71579a817736bf741bc6001dab472a95c56b2

    • SHA512

      f54afbfd1bbd5001dcbb0fc2ed7b52f1da61f31c7938181f5a892a5ff6dd6685bf337f9696381b6625d30fa01335d880477f5c2f1b15dfc21d424b6ddb4936fa

    • SSDEEP

      49152:f/QOZrOHIERZDYQEhuErSdlHdEcHDiwy326P4vUpOspgDAT4cfO0teaHrpyId6J+:3/uDbEhuecHJeiWOspuEl5UasN4

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks