General

  • Target

    ba1se.apk

  • Size

    4.1MB

  • Sample

    240619-xmh5aa1gqq

  • MD5

    d8c81f97a6d2a5ced0bbc64df60fb4ce

  • SHA1

    cfc6a81e6c358d712ede912dd2e31912a99891fd

  • SHA256

    2aac6610f0dabaede89c36c90e0761935d0a1fb58fa2820f1427b0a16349a7e5

  • SHA512

    e87653fc267f761fb9fcd0701d93409cf8afd63a861aaf953f3687c13b9084c10a20d6f6a23d3516646a7603a209b4b154ea46de3ff5fb74053e606b0abbacb3

  • SSDEEP

    98304:FFsgARDL2xjv9RJTgDJWKlXe3poumd2ZruKv:FugADL2xb7JgD3sVnv

Malware Config

Targets

    • Target

      ba1se.apk

    • Size

      4.1MB

    • MD5

      d8c81f97a6d2a5ced0bbc64df60fb4ce

    • SHA1

      cfc6a81e6c358d712ede912dd2e31912a99891fd

    • SHA256

      2aac6610f0dabaede89c36c90e0761935d0a1fb58fa2820f1427b0a16349a7e5

    • SHA512

      e87653fc267f761fb9fcd0701d93409cf8afd63a861aaf953f3687c13b9084c10a20d6f6a23d3516646a7603a209b4b154ea46de3ff5fb74053e606b0abbacb3

    • SSDEEP

      98304:FFsgARDL2xjv9RJTgDJWKlXe3poumd2ZruKv:FugADL2xb7JgD3sVnv

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks