General

  • Target

    1700036ba626d84a304b3320e640f8777a417ad138567b7eac579708db787c6c.bin

  • Size

    1.6MB

  • Sample

    240619-arzaqszena

  • MD5

    c529f84c48a56fb46366fa8fda0a1361

  • SHA1

    f19a00e46cb58519ae687289c655d2753852227e

  • SHA256

    1700036ba626d84a304b3320e640f8777a417ad138567b7eac579708db787c6c

  • SHA512

    e088717e2b8f8003e816bc072753873ccfa535904c86e4c8954979ac90624e748c13817d68202dc395a01b9d46bbe40b181caf452c144103bec12fdc361c88c3

  • SSDEEP

    24576:zDhsgggZ1/cXx49X4UsbMiIxgnYg8szfr+ha4BCRL:zDCgXZ1/cXm9XCbagnYg8szfr+EB

Malware Config

Targets

    • Target

      1700036ba626d84a304b3320e640f8777a417ad138567b7eac579708db787c6c.bin

    • Size

      1.6MB

    • MD5

      c529f84c48a56fb46366fa8fda0a1361

    • SHA1

      f19a00e46cb58519ae687289c655d2753852227e

    • SHA256

      1700036ba626d84a304b3320e640f8777a417ad138567b7eac579708db787c6c

    • SHA512

      e088717e2b8f8003e816bc072753873ccfa535904c86e4c8954979ac90624e748c13817d68202dc395a01b9d46bbe40b181caf452c144103bec12fdc361c88c3

    • SSDEEP

      24576:zDhsgggZ1/cXx49X4UsbMiIxgnYg8szfr+ha4BCRL:zDCgXZ1/cXm9XCbagnYg8szfr+EB

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks