General

  • Target

    sib.V9.apk

  • Size

    3.6MB

  • Sample

    240620-jy2twaxclf

  • MD5

    e17d939e03943dd8c9388914e4127319

  • SHA1

    c52aed7e93e5926c8a2f0c948dd5b7d7a297a11a

  • SHA256

    ad50f075a694d84ccabb013b2b518f13e07009bd5544f42b3f9ccf5254fe1b02

  • SHA512

    15f06e84c2829363f4f2a6496968b59bca240d128f5dec18f36ce00284051ec6e8a9c55bd311258496efc4c989ceec3d7ea16832ec1eaf08ae28b130b9bb39cf

  • SSDEEP

    49152:IuKaXmm7E9J9gPAwKnXj9u3Y6ByMjgNv0LQftADTTpsydB3OVb8YiDN0pIpvvT:IutTEdBg6MjkOQ1ATpsyTOF5c6YT

Malware Config

Targets

    • Target

      sib.V9.apk

    • Size

      3.6MB

    • MD5

      e17d939e03943dd8c9388914e4127319

    • SHA1

      c52aed7e93e5926c8a2f0c948dd5b7d7a297a11a

    • SHA256

      ad50f075a694d84ccabb013b2b518f13e07009bd5544f42b3f9ccf5254fe1b02

    • SHA512

      15f06e84c2829363f4f2a6496968b59bca240d128f5dec18f36ce00284051ec6e8a9c55bd311258496efc4c989ceec3d7ea16832ec1eaf08ae28b130b9bb39cf

    • SSDEEP

      49152:IuKaXmm7E9J9gPAwKnXj9u3Y6ByMjgNv0LQftADTTpsydB3OVb8YiDN0pIpvvT:IutTEdBg6MjkOQ1ATpsyTOF5c6YT

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks