General

  • Target

    ble4fit_v2.apk

  • Size

    10.3MB

  • Sample

    240522-pepyvshg4x

  • MD5

    12b0bf4b5f7636a1cd9b7fcce0c0d80b

  • SHA1

    6d14104c299e228745f94b1afb30a232dd10f6a2

  • SHA256

    55208f18a5453969d69f75a7c8fd7027a4e4313369f285f63ba5995fa542c6d6

  • SHA512

    37c454052a79afbd8521d20441388cac6d5a05c6a2ec3c66ddadba4d59bbb0db50b7cf545a1b6677221af85f5cfc2e3bd67b53fef97bde124e1f5bc3856a0c01

  • SSDEEP

    196608:U26OreXq46ChP3ubSeLrNUg4iLPoHRejr2kmIIAdgFknepqH4av/mA4EwZyEaRlk:fl4HGNN0ejikmIddqkeMvmpFZyPRS

Malware Config

Targets

    • Target

      ble4fit_v2.apk

    • Size

      10.3MB

    • MD5

      12b0bf4b5f7636a1cd9b7fcce0c0d80b

    • SHA1

      6d14104c299e228745f94b1afb30a232dd10f6a2

    • SHA256

      55208f18a5453969d69f75a7c8fd7027a4e4313369f285f63ba5995fa542c6d6

    • SHA512

      37c454052a79afbd8521d20441388cac6d5a05c6a2ec3c66ddadba4d59bbb0db50b7cf545a1b6677221af85f5cfc2e3bd67b53fef97bde124e1f5bc3856a0c01

    • SSDEEP

      196608:U26OreXq46ChP3ubSeLrNUg4iLPoHRejr2kmIIAdgFknepqH4av/mA4EwZyEaRlk:fl4HGNN0ejikmIddqkeMvmpFZyPRS

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks