General

  • Target

    5f80dd7fccff6e15d5eda6e0e8263d9f985462155d23f335baaa0a44ea7f5712

  • Size

    6.5MB

  • Sample

    240721-ntwvaazaqb

  • MD5

    ac1b77d65246799e91fbbaf7c6a9cce9

  • SHA1

    c9b3c027566da411e66942af9a575893ffd41f5c

  • SHA256

    5f80dd7fccff6e15d5eda6e0e8263d9f985462155d23f335baaa0a44ea7f5712

  • SHA512

    f4a832849613f95b6cfceadceab792fd0022a7f925261ca950e963be41103d1bde93bb6c0298de7f13038b2c2f677c986a1637807bea1c27276292a02aba1089

  • SSDEEP

    98304:UUg7Gu5IfRSnPueFuaSMgg6MKRbV+pui2rmyOVLSFivt+OCvibZ+9Uy:ZeGIIteIcx6lbQpuiodMkiViZ

Malware Config

Targets

    • Target

      5f80dd7fccff6e15d5eda6e0e8263d9f985462155d23f335baaa0a44ea7f5712

    • Size

      6.5MB

    • MD5

      ac1b77d65246799e91fbbaf7c6a9cce9

    • SHA1

      c9b3c027566da411e66942af9a575893ffd41f5c

    • SHA256

      5f80dd7fccff6e15d5eda6e0e8263d9f985462155d23f335baaa0a44ea7f5712

    • SHA512

      f4a832849613f95b6cfceadceab792fd0022a7f925261ca950e963be41103d1bde93bb6c0298de7f13038b2c2f677c986a1637807bea1c27276292a02aba1089

    • SSDEEP

      98304:UUg7Gu5IfRSnPueFuaSMgg6MKRbV+pui2rmyOVLSFivt+OCvibZ+9Uy:ZeGIIteIcx6lbQpuiodMkiViZ

    • Checks if the Android device is rooted.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks