General

  • Target

    inat-box-v13-rc2.apk

  • Size

    10.8MB

  • Sample

    240626-rf5rta1bkm

  • MD5

    9c6cae30bd0dccca546a60b36c36c0eb

  • SHA1

    b004c1554c34e88e5d773b354159246c261ae04f

  • SHA256

    b42069ac7eed7d2f4ea14971325d0e4dd7730732d868eaf0606142a5894e30d8

  • SHA512

    937d45c85de983673948545715afe90b27906c9f5b5152c34074d469cc11149c1de0bbbe92d970bbfe983cf5e9a4d8035c0dc18f8c16d531bf6f6199056a0e3d

  • SSDEEP

    196608:x6gVh4mcVyYZrRxNRR0GAetwwo1alPLFC1vhzqAkFcdgFsNmUP0ZFn:xLBSX0GEwZLYFhz9kFcdc8NM7

Malware Config

Targets

    • Target

      inat-box-v13-rc2.apk

    • Size

      10.8MB

    • MD5

      9c6cae30bd0dccca546a60b36c36c0eb

    • SHA1

      b004c1554c34e88e5d773b354159246c261ae04f

    • SHA256

      b42069ac7eed7d2f4ea14971325d0e4dd7730732d868eaf0606142a5894e30d8

    • SHA512

      937d45c85de983673948545715afe90b27906c9f5b5152c34074d469cc11149c1de0bbbe92d970bbfe983cf5e9a4d8035c0dc18f8c16d531bf6f6199056a0e3d

    • SSDEEP

      196608:x6gVh4mcVyYZrRxNRR0GAetwwo1alPLFC1vhzqAkFcdgFsNmUP0ZFn:xLBSX0GEwZLYFhz9kFcdc8NM7

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks