General

  • Target

    icci-xbxv2.apk

  • Size

    3.6MB

  • Sample

    240610-h3nblsdf6w

  • MD5

    dbc2d76f70c765a0d13d44eb84226106

  • SHA1

    48cd004606a4c9fe3247af1956dd2d379815f6b3

  • SHA256

    420e1c7aa2556433ee8970036291619ff2cca8071ab230a1c2d61fdf3195a1f4

  • SHA512

    cf52bd69c5ff54dcb7edd5340be0e133ee6eb57b5c8a7d6ba577ecc9e145ab6467679b70d3601069ad98db08cce7322283c287dcd9c08716479a01394b9e4149

  • SSDEEP

    49152:sanZoyFAhzTR17WOV/Tc35I6k5xJbyITiTXtwoZcANYXz6oeUJ5hvQxjYH4rmIk9:DnCyu5TR17WOV0kVtN9Ffhvsja4r9oTD

Malware Config

Targets

    • Target

      icci-xbxv2.apk

    • Size

      3.6MB

    • MD5

      dbc2d76f70c765a0d13d44eb84226106

    • SHA1

      48cd004606a4c9fe3247af1956dd2d379815f6b3

    • SHA256

      420e1c7aa2556433ee8970036291619ff2cca8071ab230a1c2d61fdf3195a1f4

    • SHA512

      cf52bd69c5ff54dcb7edd5340be0e133ee6eb57b5c8a7d6ba577ecc9e145ab6467679b70d3601069ad98db08cce7322283c287dcd9c08716479a01394b9e4149

    • SSDEEP

      49152:sanZoyFAhzTR17WOV/Tc35I6k5xJbyITiTXtwoZcANYXz6oeUJ5hvQxjYH4rmIk9:DnCyu5TR17WOV0kVtN9Ffhvsja4r9oTD

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks