General

  • Target

    E78A8DFF098C31BBBAA3F2F6321DC9D99A5DFB14278B0936169B590B737FA78B.apk

  • Size

    9.0MB

  • Sample

    240627-j8rfwstckk

  • MD5

    5a600a4de059b271fa8fc71206f8c91a

  • SHA1

    eaf5035ed3017e1ee4c2853328adec7f20a4d2e1

  • SHA256

    e78a8dff098c31bbbaa3f2f6321dc9d99a5dfb14278b0936169b590b737fa78b

  • SHA512

    99bb188ca400be26c340976ba010864a886e8930adbf13f31c4b5c85033714fa94c9cbc76a6af7e0dd0168a92b4358477519ae015c40c9816d05f5a1a2640ae8

  • SSDEEP

    196608:DYiOSyuYlCuJFbNuxe6ejx5YO7RRlxPxpYvY2aq7fELyiqegaJMwLfCSQwxyouf:DTyLCucM6IoOfxp07gFqNajLCSQwTuf

Malware Config

Targets

    • Target

      E78A8DFF098C31BBBAA3F2F6321DC9D99A5DFB14278B0936169B590B737FA78B.apk

    • Size

      9.0MB

    • MD5

      5a600a4de059b271fa8fc71206f8c91a

    • SHA1

      eaf5035ed3017e1ee4c2853328adec7f20a4d2e1

    • SHA256

      e78a8dff098c31bbbaa3f2f6321dc9d99a5dfb14278b0936169b590b737fa78b

    • SHA512

      99bb188ca400be26c340976ba010864a886e8930adbf13f31c4b5c85033714fa94c9cbc76a6af7e0dd0168a92b4358477519ae015c40c9816d05f5a1a2640ae8

    • SSDEEP

      196608:DYiOSyuYlCuJFbNuxe6ejx5YO7RRlxPxpYvY2aq7fELyiqegaJMwLfCSQwxyouf:DTyLCucM6IoOfxp07gFqNajLCSQwTuf

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks