General

  • Target

    NetherSX2.v1.5-4248-v1.8.apk

  • Size

    21.2MB

  • Sample

    240615-l53qvszfnk

  • MD5

    d54af568cf579e577cd6627801830152

  • SHA1

    3d619c175eb27215951fd5287492416132ab2cf3

  • SHA256

    56ceeb89a263c8fa6e0afb7ebdd8fdf47300d097eac4b2eddefa22ea9cf51b6f

  • SHA512

    9f2da7f13955ef3052220e285f47b435800f515a082b0fb1c0ea48b579234fbf8f26ec50eb39bd35a67a2256e8e0d82c1899e4244feb9c5e8bdcfcc3179d3611

  • SSDEEP

    196608:plB8SIIEI/M5HEygJlsz9Tu34tCtwqpyqxqJ78fy21oAIjsu5HrMpTIaqKR6AASs:DBQ+M5k+qpy9Wy3AIZgSu3dD+

Malware Config

Targets

    • Target

      NetherSX2.v1.5-4248-v1.8.apk

    • Size

      21.2MB

    • MD5

      d54af568cf579e577cd6627801830152

    • SHA1

      3d619c175eb27215951fd5287492416132ab2cf3

    • SHA256

      56ceeb89a263c8fa6e0afb7ebdd8fdf47300d097eac4b2eddefa22ea9cf51b6f

    • SHA512

      9f2da7f13955ef3052220e285f47b435800f515a082b0fb1c0ea48b579234fbf8f26ec50eb39bd35a67a2256e8e0d82c1899e4244feb9c5e8bdcfcc3179d3611

    • SSDEEP

      196608:plB8SIIEI/M5HEygJlsz9Tu34tCtwqpyqxqJ78fy21oAIjsu5HrMpTIaqKR6AASs:DBQ+M5k+qpy9Wy3AIZgSu3dD+

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Matrix

Tasks