General

  • Target

    8f8be17068fe3b45918f551a433f5f02.bin

  • Size

    4.4MB

  • Sample

    240604-dqbd3abc2x

  • MD5

    8f8be17068fe3b45918f551a433f5f02

  • SHA1

    51c6d53a2e2ab96efe57403eeb32098fa00c9eb7

  • SHA256

    389a7d67e24a5515510c15c8c52d73a545dd15cce47fd0b9e02c2fa2a6fb9044

  • SHA512

    cb2343f4e350e20b4864edd5ae4bfcbc54ff433a3d71f1264943b6c46ccc828fa338a03fa201e5b50d54017fb822eed9010684fdfae0faf464af862e8717db54

  • SSDEEP

    98304:zEOfaG+jG3umJeI355L9cmyFvAhBlbdMlvAA37+LlGgzO7p7AUXrAHjVrPw2F/:J35DuT7+Llk7pts

Malware Config

Targets

    • Target

      8f8be17068fe3b45918f551a433f5f02.bin

    • Size

      4.4MB

    • MD5

      8f8be17068fe3b45918f551a433f5f02

    • SHA1

      51c6d53a2e2ab96efe57403eeb32098fa00c9eb7

    • SHA256

      389a7d67e24a5515510c15c8c52d73a545dd15cce47fd0b9e02c2fa2a6fb9044

    • SHA512

      cb2343f4e350e20b4864edd5ae4bfcbc54ff433a3d71f1264943b6c46ccc828fa338a03fa201e5b50d54017fb822eed9010684fdfae0faf464af862e8717db54

    • SSDEEP

      98304:zEOfaG+jG3umJeI355L9cmyFvAhBlbdMlvAA37+LlGgzO7p7AUXrAHjVrPw2F/:J35DuT7+Llk7pts

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Queries the unique device ID (IMEI, MEID, IMSI)

MITRE ATT&CK Mobile v15

Tasks