General

  • Target

    498a053b192aa54a2439cd958e14a8a377adde461c79a813ca61823c1724ae70.bin

  • Size

    4.7MB

  • Sample

    240523-1wnb5sad7y

  • MD5

    e4bebac88eb12c53d7296152813943d4

  • SHA1

    25f0bf004cfa0ad1c5f9f6a0a236ba34b6e05191

  • SHA256

    498a053b192aa54a2439cd958e14a8a377adde461c79a813ca61823c1724ae70

  • SHA512

    9625287f472d2bc39707e088e676df8ba1829b6f50517a4d830a8b3280213ba1f61a0ac591a4c5aaa42829eb6a0870515d7bb17e2f34a7280b240547a4bd6e71

  • SSDEEP

    98304:PkgH0Z66sxdEy+nBe8M0kPV7X/ZFyniGs3P/RFe8HP2Zr9uY:D0Vsr8nEFN7RsiGs3P7ewY

Malware Config

Targets

    • Target

      498a053b192aa54a2439cd958e14a8a377adde461c79a813ca61823c1724ae70.bin

    • Size

      4.7MB

    • MD5

      e4bebac88eb12c53d7296152813943d4

    • SHA1

      25f0bf004cfa0ad1c5f9f6a0a236ba34b6e05191

    • SHA256

      498a053b192aa54a2439cd958e14a8a377adde461c79a813ca61823c1724ae70

    • SHA512

      9625287f472d2bc39707e088e676df8ba1829b6f50517a4d830a8b3280213ba1f61a0ac591a4c5aaa42829eb6a0870515d7bb17e2f34a7280b240547a4bd6e71

    • SSDEEP

      98304:PkgH0Z66sxdEy+nBe8M0kPV7X/ZFyniGs3P/RFe8HP2Zr9uY:D0Vsr8nEFN7RsiGs3P7ewY

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks