General

  • Target

    4c1ec1816a1f85d5547bc9b5076367aa056a85fac35bc4d76198589054a1841b.bin

  • Size

    4.2MB

  • Sample

    240614-2je1nssflm

  • MD5

    ab39084391bd609f828ce0d7ce8190d8

  • SHA1

    dade8873caf6e2375cd29a6509feca2f9b52ca60

  • SHA256

    4c1ec1816a1f85d5547bc9b5076367aa056a85fac35bc4d76198589054a1841b

  • SHA512

    2cfd2134397b8bc580db80cbc4b8b62aeb46954b014fe15bbd16ba39ee2009f532d235cf30d302f35803b6b361925cc8a7cd0a41a71fa59da24a601d9833a212

  • SSDEEP

    98304:ovQXFcsmuUOlejypRFOyPkey90ylWChHuPke4Ipo/KrvAl:oomsVUCXkeByNuPkZ

Malware Config

Targets

    • Target

      4c1ec1816a1f85d5547bc9b5076367aa056a85fac35bc4d76198589054a1841b.bin

    • Size

      4.2MB

    • MD5

      ab39084391bd609f828ce0d7ce8190d8

    • SHA1

      dade8873caf6e2375cd29a6509feca2f9b52ca60

    • SHA256

      4c1ec1816a1f85d5547bc9b5076367aa056a85fac35bc4d76198589054a1841b

    • SHA512

      2cfd2134397b8bc580db80cbc4b8b62aeb46954b014fe15bbd16ba39ee2009f532d235cf30d302f35803b6b361925cc8a7cd0a41a71fa59da24a601d9833a212

    • SSDEEP

      98304:ovQXFcsmuUOlejypRFOyPkey90ylWChHuPke4Ipo/KrvAl:oomsVUCXkeByNuPkZ

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks