General

  • Target

    e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8

  • Size

    2.0MB

  • Sample

    240522-cqr65shb55

  • MD5

    71f6cdb3d8eebe1c8e7e26896238e571

  • SHA1

    019134386a6d900d61285e5e986249928a9504b6

  • SHA256

    e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8

  • SHA512

    740e8bcde7462b99972ea472ee0cae53f4f61fcdc6d9ca1c8c44d0661323178c891f7fe82052cd7bae7239d7a953a6dcdb5e6fc42b28cd4acc9e1634e284228b

  • SSDEEP

    49152:I8FjWz5Kzip37zl3fg1S1RvyzHth1mFI1/3Go1eiUMG1VummJwga8TGi3U/kX1l5:IIhup37zlviS1GHoFW3aiUM6ummJwgaE

Malware Config

Targets

    • Target

      e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8

    • Size

      2.0MB

    • MD5

      71f6cdb3d8eebe1c8e7e26896238e571

    • SHA1

      019134386a6d900d61285e5e986249928a9504b6

    • SHA256

      e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8

    • SHA512

      740e8bcde7462b99972ea472ee0cae53f4f61fcdc6d9ca1c8c44d0661323178c891f7fe82052cd7bae7239d7a953a6dcdb5e6fc42b28cd4acc9e1634e284228b

    • SSDEEP

      49152:I8FjWz5Kzip37zl3fg1S1RvyzHth1mFI1/3Go1eiUMG1VummJwga8TGi3U/kX1l5:IIhup37zlviS1GHoFW3aiUM6ummJwgaE

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks