General

  • Target

    LocationEye.apk

  • Size

    6.2MB

  • Sample

    240713-vtb87szdnm

  • MD5

    f9c0a3c6293cafcbde9b121142fb0efc

  • SHA1

    0b8be92bfe23c9c42950fe1c50152d6e1e3a966d

  • SHA256

    9175baf1c90188b01b3e35b90ef72c9dd2a88a66aa95022f58103016b7524744

  • SHA512

    c38d489042ba41df7ab6632b26b8ab3ab719427c66663c02f090a77c8697c8b924549781eec50773dc0b4a0cc4d6cec821e87317173818e072871df6c7de9d50

  • SSDEEP

    196608:rj5iXh2vtPQq1bo/tZXck2jLH5CtXfJ6p8j:uetYuboDMlH528pg

Malware Config

Targets

    • Target

      LocationEye.apk

    • Size

      6.2MB

    • MD5

      f9c0a3c6293cafcbde9b121142fb0efc

    • SHA1

      0b8be92bfe23c9c42950fe1c50152d6e1e3a966d

    • SHA256

      9175baf1c90188b01b3e35b90ef72c9dd2a88a66aa95022f58103016b7524744

    • SHA512

      c38d489042ba41df7ab6632b26b8ab3ab719427c66663c02f090a77c8697c8b924549781eec50773dc0b4a0cc4d6cec821e87317173818e072871df6c7de9d50

    • SSDEEP

      196608:rj5iXh2vtPQq1bo/tZXck2jLH5CtXfJ6p8j:uetYuboDMlH528pg

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Detected potential entity reuse from brand spotify.

MITRE ATT&CK Mobile v15

Tasks