General

  • Target

    72c39f93a5f1e0d1c63cc9ba44bf55214749a3660608a99cca2373e2f4fb8532.bin

  • Size

    2.0MB

  • Sample

    240602-2j2jnshe9v

  • MD5

    069b90bcaf1297c74897e6a976b29903

  • SHA1

    72c921e4ef71be791c4a3651c5b675e8604da845

  • SHA256

    72c39f93a5f1e0d1c63cc9ba44bf55214749a3660608a99cca2373e2f4fb8532

  • SHA512

    2bd045173493da0d2da6c466ffb27dc3275e3f2973f764aa8eb20204a8d29b66de24fded853c810b6b636b4f426f24c7908e4d6ed489f816d54863e3380e141e

  • SSDEEP

    49152:verzycLUZ0Lnkk6Y3WYnEboddW0j8AoQgcMgSxNLY:m//LUZ0LD6Y3WYnEqw7XcUZY

Malware Config

Targets

    • Target

      72c39f93a5f1e0d1c63cc9ba44bf55214749a3660608a99cca2373e2f4fb8532.bin

    • Size

      2.0MB

    • MD5

      069b90bcaf1297c74897e6a976b29903

    • SHA1

      72c921e4ef71be791c4a3651c5b675e8604da845

    • SHA256

      72c39f93a5f1e0d1c63cc9ba44bf55214749a3660608a99cca2373e2f4fb8532

    • SHA512

      2bd045173493da0d2da6c466ffb27dc3275e3f2973f764aa8eb20204a8d29b66de24fded853c810b6b636b4f426f24c7908e4d6ed489f816d54863e3380e141e

    • SSDEEP

      49152:verzycLUZ0Lnkk6Y3WYnEboddW0j8AoQgcMgSxNLY:m//LUZ0LD6Y3WYnEqw7XcUZY

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks