General

  • Target

    cb15257128695991a490b70a32e2e9f0.bin

  • Size

    9.2MB

  • Sample

    240708-egqm3a1ekl

  • MD5

    cb15257128695991a490b70a32e2e9f0

  • SHA1

    d5bd6500ae07fe8651956da78bdae50bcb1ac4bf

  • SHA256

    5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1

  • SHA512

    405edd8363992e9c918a57fedf497172c64579fbab0894d8ce221a6208d5936f758188c31ac822fb34d598e7b03af69927d7a3c07123c6205f94f6da1e058981

  • SSDEEP

    196608:mO4rYye2J4LHATYmx3ynDstkgGdrjjVUntcOEZdZ7OEf6SZ:m1YyT4LgjCDgUrjZyi

Malware Config

Targets

    • Target

      cb15257128695991a490b70a32e2e9f0.bin

    • Size

      9.2MB

    • MD5

      cb15257128695991a490b70a32e2e9f0

    • SHA1

      d5bd6500ae07fe8651956da78bdae50bcb1ac4bf

    • SHA256

      5812872a1cfa2c88dd7477881ee7e4015b237f35ad7cb9b3d930d291d560e6a1

    • SHA512

      405edd8363992e9c918a57fedf497172c64579fbab0894d8ce221a6208d5936f758188c31ac822fb34d598e7b03af69927d7a3c07123c6205f94f6da1e058981

    • SSDEEP

      196608:mO4rYye2J4LHATYmx3ynDstkgGdrjjVUntcOEZdZ7OEf6SZ:m1YyT4LgjCDgUrjZyi

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks