General

  • Target

    Edalathamrah.apk

  • Size

    3.6MB

  • Sample

    240708-ajvbtavhke

  • MD5

    137051f21856123cb25530994883e1cc

  • SHA1

    024bdee3a7bec368a8a460ac09e07e361776451a

  • SHA256

    b0b006464c4eb6ecc09ebbcea91f56822f97bab9d8e4341d362ed94257c76aa2

  • SHA512

    4579cbe55dad6ad44a14b166124fd047aca37aed136258dfe5d976a27e955239568c3091f502fa4d7b11b3136a99e453b99508385812c373f6a74cdc6e2b8c0b

  • SSDEEP

    98304:OAyaNOBvwbNZapFvjvyjJUy1lDB3uQ5ZWqyOSvNb:8aNOFwbupFbvyjJlfeQHWqy3b

Malware Config

Targets

    • Target

      Edalathamrah.apk

    • Size

      3.6MB

    • MD5

      137051f21856123cb25530994883e1cc

    • SHA1

      024bdee3a7bec368a8a460ac09e07e361776451a

    • SHA256

      b0b006464c4eb6ecc09ebbcea91f56822f97bab9d8e4341d362ed94257c76aa2

    • SHA512

      4579cbe55dad6ad44a14b166124fd047aca37aed136258dfe5d976a27e955239568c3091f502fa4d7b11b3136a99e453b99508385812c373f6a74cdc6e2b8c0b

    • SSDEEP

      98304:OAyaNOBvwbNZapFvjvyjJUy1lDB3uQ5ZWqyOSvNb:8aNOFwbupFbvyjJlfeQHWqy3b

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks