General

  • Target

    eblagh.apk

  • Size

    2.7MB

  • Sample

    240614-tvx2mayakb

  • MD5

    d790728ab443c2f8cbcc75436d015667

  • SHA1

    f5e7c9f2f978cfaccdc83af40496644496e7199d

  • SHA256

    0dfb898292c16c395943a38ac8c5eb7b4e9f7d72781cb901df295ccc279717f9

  • SHA512

    43c5eefd1eca0e29e3ab48066f0f3ffff19985e0fd23897205302479f2a2084f5eabbeff07faaf6164bc67ef69c75cf698a5bc0e3b491ecfbf2f75e3a82f9366

  • SSDEEP

    49152:w/mbwyKDDDDIDDDIdRnNOA+Wj765PNGtCkJ97xxZPk66gEYiNXZ5qI8ZM/xXgqEN:ejyO9n+WK5FGI09Tt6fYQ/8wXpEsQ

Malware Config

Targets

    • Target

      eblagh.apk

    • Size

      2.7MB

    • MD5

      d790728ab443c2f8cbcc75436d015667

    • SHA1

      f5e7c9f2f978cfaccdc83af40496644496e7199d

    • SHA256

      0dfb898292c16c395943a38ac8c5eb7b4e9f7d72781cb901df295ccc279717f9

    • SHA512

      43c5eefd1eca0e29e3ab48066f0f3ffff19985e0fd23897205302479f2a2084f5eabbeff07faaf6164bc67ef69c75cf698a5bc0e3b491ecfbf2f75e3a82f9366

    • SSDEEP

      49152:w/mbwyKDDDDIDDDIdRnNOA+Wj765PNGtCkJ97xxZPk66gEYiNXZ5qI8ZM/xXgqEN:ejyO9n+WK5FGI09Tt6fYQ/8wXpEsQ

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks