General

  • Target

    detiktoto.apk

  • Size

    82KB

  • Sample

    240703-bfw7nsyhjd

  • MD5

    942ced1ebbc554158fa3423c3d50d7ee

  • SHA1

    574423a6816df2d1095518f16dd553f8c7100de1

  • SHA256

    b19650f62ef7dd2f0a7f609270bfb9800119ec24b80df4a7f01da0c45070d914

  • SHA512

    2181640f459c2ceea3d2d7593651807f9c4e50879d142e72c3325130edda4d3b55b17fbda3a25c9ca1536d2b56b999c8cba2c73071f47552d68ff0e1b9f84d3a

  • SSDEEP

    1536:BHmHfJbUU4lmqjItxfCcIQ8Be4+VCGItvGWE4aB:NAYmIIt98jBG4LeWEb

Malware Config

Targets

    • Target

      detiktoto.apk

    • Size

      82KB

    • MD5

      942ced1ebbc554158fa3423c3d50d7ee

    • SHA1

      574423a6816df2d1095518f16dd553f8c7100de1

    • SHA256

      b19650f62ef7dd2f0a7f609270bfb9800119ec24b80df4a7f01da0c45070d914

    • SHA512

      2181640f459c2ceea3d2d7593651807f9c4e50879d142e72c3325130edda4d3b55b17fbda3a25c9ca1536d2b56b999c8cba2c73071f47552d68ff0e1b9f84d3a

    • SSDEEP

      1536:BHmHfJbUU4lmqjItxfCcIQ8Be4+VCGItvGWE4aB:NAYmIIt98jBG4LeWEb

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks