General
-
Target
inat-box-v13-rc2.apk
-
Size
10.8MB
-
Sample
240626-rf5rta1bkm
-
MD5
9c6cae30bd0dccca546a60b36c36c0eb
-
SHA1
b004c1554c34e88e5d773b354159246c261ae04f
-
SHA256
b42069ac7eed7d2f4ea14971325d0e4dd7730732d868eaf0606142a5894e30d8
-
SHA512
937d45c85de983673948545715afe90b27906c9f5b5152c34074d469cc11149c1de0bbbe92d970bbfe983cf5e9a4d8035c0dc18f8c16d531bf6f6199056a0e3d
-
SSDEEP
196608:x6gVh4mcVyYZrRxNRR0GAetwwo1alPLFC1vhzqAkFcdgFsNmUP0ZFn:xLBSX0GEwZLYFhz9kFcdc8NM7
Static task
static1
Behavioral task
behavioral1
Sample
inat-box-v13-rc2.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
inat-box-v13-rc2.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
inat-box-v13-rc2.apk
-
Size
10.8MB
-
MD5
9c6cae30bd0dccca546a60b36c36c0eb
-
SHA1
b004c1554c34e88e5d773b354159246c261ae04f
-
SHA256
b42069ac7eed7d2f4ea14971325d0e4dd7730732d868eaf0606142a5894e30d8
-
SHA512
937d45c85de983673948545715afe90b27906c9f5b5152c34074d469cc11149c1de0bbbe92d970bbfe983cf5e9a4d8035c0dc18f8c16d531bf6f6199056a0e3d
-
SSDEEP
196608:x6gVh4mcVyYZrRxNRR0GAetwwo1alPLFC1vhzqAkFcdgFsNmUP0ZFn:xLBSX0GEwZLYFhz9kFcdc8NM7
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Legitimate hosting services abused for malware hosting/C2
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1