General

  • Target

    86fd0b4a0731cbbe38241ba277f98a4c7c3f88a2585c4ab88dba80fdf9418b99.bin

  • Size

    3.4MB

  • Sample

    240530-2l4f2sdd34

  • MD5

    1577e6c6c1f38c25d6e1b2ee6fcde30c

  • SHA1

    2716d45d033cc761079e17bdaf95bd03dedd9857

  • SHA256

    86fd0b4a0731cbbe38241ba277f98a4c7c3f88a2585c4ab88dba80fdf9418b99

  • SHA512

    e70e51f0103dadaf3380fd139cd1d7ee0f59c9c3263bb169388e7b17ce259609817bbeb6465082bff1296d5e6713bd8a8a042eed5d035d6b7d72ff582ef964be

  • SSDEEP

    49152:NLZ/VatSV2Bo+4tdc/ThZMH4ToTwr5jE0rljwvsrhEZGDQ69kw9kK1iD:PVmSwX4qToTwr5jTlU84GDHX9k4iD

Malware Config

Targets

    • Target

      86fd0b4a0731cbbe38241ba277f98a4c7c3f88a2585c4ab88dba80fdf9418b99.bin

    • Size

      3.4MB

    • MD5

      1577e6c6c1f38c25d6e1b2ee6fcde30c

    • SHA1

      2716d45d033cc761079e17bdaf95bd03dedd9857

    • SHA256

      86fd0b4a0731cbbe38241ba277f98a4c7c3f88a2585c4ab88dba80fdf9418b99

    • SHA512

      e70e51f0103dadaf3380fd139cd1d7ee0f59c9c3263bb169388e7b17ce259609817bbeb6465082bff1296d5e6713bd8a8a042eed5d035d6b7d72ff582ef964be

    • SSDEEP

      49152:NLZ/VatSV2Bo+4tdc/ThZMH4ToTwr5jE0rljwvsrhEZGDQ69kw9kK1iD:PVmSwX4qToTwr5jTlU84GDHX9k4iD

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks