General

  • Target

    9ca1f601e4a014349e56f6cd07f44d0ecf2d0d2bbdf75841257714161b61c581

  • Size

    4.9MB

  • Sample

    240721-n2lz2szcja

  • MD5

    1bd1d28f5db0da9772b6d132f896c74e

  • SHA1

    3356eb73ee99cd4133e19254ff337c1acc668f9a

  • SHA256

    9ca1f601e4a014349e56f6cd07f44d0ecf2d0d2bbdf75841257714161b61c581

  • SHA512

    ccf8daf3e427f512963222f51f49d66d1d0952a5eddaa6aa2d976bb3217c4f2ca4478e3915c09cb45531f23badee18e16da74c2c1f179ba163cd9a0416d60cb9

  • SSDEEP

    98304:UM8tDYRpYWx+qjcdciLBWThdotdyd6v1FNoLp84hOPFOB:b8tERpQqNxT3o3lv1iOPFs

Malware Config

Targets

    • Target

      9ca1f601e4a014349e56f6cd07f44d0ecf2d0d2bbdf75841257714161b61c581

    • Size

      4.9MB

    • MD5

      1bd1d28f5db0da9772b6d132f896c74e

    • SHA1

      3356eb73ee99cd4133e19254ff337c1acc668f9a

    • SHA256

      9ca1f601e4a014349e56f6cd07f44d0ecf2d0d2bbdf75841257714161b61c581

    • SHA512

      ccf8daf3e427f512963222f51f49d66d1d0952a5eddaa6aa2d976bb3217c4f2ca4478e3915c09cb45531f23badee18e16da74c2c1f179ba163cd9a0416d60cb9

    • SSDEEP

      98304:UM8tDYRpYWx+qjcdciLBWThdotdyd6v1FNoLp84hOPFOB:b8tERpQqNxT3o3lv1iOPFs

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks