General

  • Target

    AF2FE81165AE6F9C3048CEADF1B43B6490C3A79121E9FC6FB0D62CA7E99E6BA4.apk

  • Size

    3.2MB

  • Sample

    240627-kekxpa1gnb

  • MD5

    8d3b87db47fcd601bbadfb12621c86f4

  • SHA1

    6d81952dc822d2c5d8834b6b882692d28711a31e

  • SHA256

    af2fe81165ae6f9c3048ceadf1b43b6490c3a79121e9fc6fb0d62ca7e99e6ba4

  • SHA512

    a808b897feb283989928da49809902dd9cb785bb682d59d648c0e7609848d09ee37572c1ef579d1e7de0b8662f905aa40d09e79be0758f3d229f7116494b77f2

  • SSDEEP

    98304:chsQY/kKV8zIb4jV/nYfTh1XDhe7EJIXvgfxc:FQYvVlkjtgFe7EWXIfxc

Malware Config

Targets

    • Target

      AF2FE81165AE6F9C3048CEADF1B43B6490C3A79121E9FC6FB0D62CA7E99E6BA4.apk

    • Size

      3.2MB

    • MD5

      8d3b87db47fcd601bbadfb12621c86f4

    • SHA1

      6d81952dc822d2c5d8834b6b882692d28711a31e

    • SHA256

      af2fe81165ae6f9c3048ceadf1b43b6490c3a79121e9fc6fb0d62ca7e99e6ba4

    • SHA512

      a808b897feb283989928da49809902dd9cb785bb682d59d648c0e7609848d09ee37572c1ef579d1e7de0b8662f905aa40d09e79be0758f3d229f7116494b77f2

    • SSDEEP

      98304:chsQY/kKV8zIb4jV/nYfTh1XDhe7EJIXvgfxc:FQYvVlkjtgFe7EWXIfxc

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks