General

  • Target

    06FFD4D7DE7C1736645FBE29CD33BFCA773340174A3985A54FE3CAAA84D8CB47.apk

  • Size

    4.1MB

  • Sample

    240627-kalcnatdpr

  • MD5

    39773d8da135d3901c425bf714899660

  • SHA1

    a2ddbe43a1f33d2961f62c241a6f41cac7c242a2

  • SHA256

    06ffd4d7de7c1736645fbe29cd33bfca773340174a3985a54fe3caaa84d8cb47

  • SHA512

    5011db4274e2bf251f88205435980ab84add386f9f7ced04cc5d2def7b238816c2fe6ddd11b802d63247271c19b6d2625ef7994b20d9d82e773cd382b7063648

  • SSDEEP

    98304:CfLf1eNvA51cP9ckCXxTrOO5Tw2D2k2gopVuix4fKFE:CjdeW5qmXxTag3KxVpVuiefl

Malware Config

Targets

    • Target

      06FFD4D7DE7C1736645FBE29CD33BFCA773340174A3985A54FE3CAAA84D8CB47.apk

    • Size

      4.1MB

    • MD5

      39773d8da135d3901c425bf714899660

    • SHA1

      a2ddbe43a1f33d2961f62c241a6f41cac7c242a2

    • SHA256

      06ffd4d7de7c1736645fbe29cd33bfca773340174a3985a54fe3caaa84d8cb47

    • SHA512

      5011db4274e2bf251f88205435980ab84add386f9f7ced04cc5d2def7b238816c2fe6ddd11b802d63247271c19b6d2625ef7994b20d9d82e773cd382b7063648

    • SSDEEP

      98304:CfLf1eNvA51cP9ckCXxTrOO5Tw2D2k2gopVuix4fKFE:CjdeW5qmXxTag3KxVpVuiefl

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Target

      classes.jar

    • Size

      5KB

    • MD5

      8737a7083123b8515d4907fa2e19701b

    • SHA1

      d81aad594f1d7e2e46924f9356d77980f8380ced

    • SHA256

      01393387043d35aedfe89de44884908ed32fe2cb7b75159afa73a893f01da858

    • SHA512

      0fa9fe17d7a7f3ece88d623fe944fbbaf00f0db3634ed57e73792011b701464d6b0ab2c31ca036b5bef0ac3ac16c65b724661f1f19d1caa2b1bfbd1db1c85a8c

    • SSDEEP

      96:hGdBnKeuYoEHSBCTQLgI6IMMgK8h828Z4eV5PpBn2qZlOSKc9mamIr/MF:SKe0AQn628ht+4e3BBn1DKpc/MF

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks