General

  • Target

    FF8E99F730B89BD508048C84C9FDC60981F5503F7D21FDD9F4769F1609EE93AE.apk

  • Size

    3.0MB

  • Sample

    240627-kemraathlr

  • MD5

    f7ebe4b22c4aa4a6d81862dda2f50712

  • SHA1

    764922f4ab7afbd3d7f3a1ad5d433c564f35307e

  • SHA256

    ff8e99f730b89bd508048c84c9fdc60981f5503f7d21fdd9f4769f1609ee93ae

  • SHA512

    1ec03ce560051192fa1d193f209d31916d9cafce662f97147f3b58186d7081a1296f12c703896076ebfc6761d02415ea783272a2f58823607f557316428d20d2

  • SSDEEP

    49152:TkSQ4lU4HHg5Z6gZxSwGRADm2Nymlxgg5H1FcChTvcsoLDXbiRbilWn:TkSQ4l3Hg5Z6HqD/Nyux5V2ChIDXt4n

Malware Config

Targets

    • Target

      FF8E99F730B89BD508048C84C9FDC60981F5503F7D21FDD9F4769F1609EE93AE.apk

    • Size

      3.0MB

    • MD5

      f7ebe4b22c4aa4a6d81862dda2f50712

    • SHA1

      764922f4ab7afbd3d7f3a1ad5d433c564f35307e

    • SHA256

      ff8e99f730b89bd508048c84c9fdc60981f5503f7d21fdd9f4769f1609ee93ae

    • SHA512

      1ec03ce560051192fa1d193f209d31916d9cafce662f97147f3b58186d7081a1296f12c703896076ebfc6761d02415ea783272a2f58823607f557316428d20d2

    • SSDEEP

      49152:TkSQ4lU4HHg5Z6gZxSwGRADm2Nymlxgg5H1FcChTvcsoLDXbiRbilWn:TkSQ4l3Hg5Z6HqD/Nyux5V2ChIDXt4n

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks