General

  • Target

    Virtual Rosetoy_1_1.0.apk

  • Size

    5.9MB

  • Sample

    240711-16jfyawgkn

  • MD5

    dc771e318b91e89e7bd6da15580190b5

  • SHA1

    842110c214f145d29e6e2032b8ce6e405d663e95

  • SHA256

    d971c90b5c3f06595f0b92502e44c2c358454f6876df9eab5c86cd80efb92bec

  • SHA512

    b347cd133e3467d7ecb8e34fe7f794dfd8a642d64ed2f5fdf0c22f0a4dfeaf63be374e12c3499b08ac59e52fd7eb3c4bcff3e43b41da17375671604bb737a679

  • SSDEEP

    98304:7DvoqhqlGTnwvGWBq6cuPctTKIyvFuLGFmMZw8duK83AId67cX7i0rOeg:7Dvoq8lennWBq6bP0TavFu1MZw8dN83q

Malware Config

Targets

    • Target

      Virtual Rosetoy_1_1.0.apk

    • Size

      5.9MB

    • MD5

      dc771e318b91e89e7bd6da15580190b5

    • SHA1

      842110c214f145d29e6e2032b8ce6e405d663e95

    • SHA256

      d971c90b5c3f06595f0b92502e44c2c358454f6876df9eab5c86cd80efb92bec

    • SHA512

      b347cd133e3467d7ecb8e34fe7f794dfd8a642d64ed2f5fdf0c22f0a4dfeaf63be374e12c3499b08ac59e52fd7eb3c4bcff3e43b41da17375671604bb737a679

    • SSDEEP

      98304:7DvoqhqlGTnwvGWBq6cuPctTKIyvFuLGFmMZw8duK83AId67cX7i0rOeg:7Dvoq8lennWBq6bP0TavFu1MZw8dN83q

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Target

      Virtual Rosetoy_1_1.0.apk

    • Size

      3.4MB

    • MD5

      60d4d71a4820f7712af3347721fac4c7

    • SHA1

      50d65acc84bad110df9d75a443b1f599151e8301

    • SHA256

      ebd5538698a4731e4ef080398d75b2a2d91a9381f9f1129e62c9eee0791551cb

    • SHA512

      e35d7d5490acf2ffa0882ce4953b2f6e89b62b370d9e36c90d81760fe242e1998ce7294aadbc9e17fde7096e25468fbd306afd3f72d71c81eafb1bd15db46570

    • SSDEEP

      49152:7Dd9oqzN3al/eTnwCoG5Seu7heIdIPwiB1yWxqBWYpWogZk7i0rOELNl:7DvoqhqlGTnwvGsAId67oX7i0rOAz

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks