General

  • Target

    07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88

  • Size

    9.4MB

  • Sample

    240528-jjnnpsce26

  • MD5

    efb8696f788a650219f1233fcf6be79b

  • SHA1

    72000a7faad1c40d56e49e9c36c2692e31b3ef59

  • SHA256

    07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88

  • SHA512

    a8a04b77546084b5bb63f5f9e443a24123a4a8c425201dc98c0d37f2c723e122d077c7c50e157ee26ced69a00baf943167ffa67588f48b7aade652485db70fa2

  • SSDEEP

    196608:DP5lb3ljyXEpy8bDRUYTnHb4Jao3GEi/+dM2WR2VCUHufTrkI1LL3aNbAGR90R:DP5lDEXE4ADRUYTHKPaHrf1H3gAG7M

Malware Config

Targets

    • Target

      07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88

    • Size

      9.4MB

    • MD5

      efb8696f788a650219f1233fcf6be79b

    • SHA1

      72000a7faad1c40d56e49e9c36c2692e31b3ef59

    • SHA256

      07ea0a73b6d33249f26a5393d30dca8977a1775439253d1b98cf4c157f402f88

    • SHA512

      a8a04b77546084b5bb63f5f9e443a24123a4a8c425201dc98c0d37f2c723e122d077c7c50e157ee26ced69a00baf943167ffa67588f48b7aade652485db70fa2

    • SSDEEP

      196608:DP5lb3ljyXEpy8bDRUYTnHb4Jao3GEi/+dM2WR2VCUHufTrkI1LL3aNbAGR90R:DP5lDEXE4ADRUYTHKPaHrf1H3gAG7M

    • Android SMSeye payload

    • SMSeye

      SMSeye is an open source Android spyware that targets Android SMS.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks