General

  • Target

    charlie_the_steak_3.0-APKTodo.apk

  • Size

    67.9MB

  • Sample

    240726-3wclrawcng

  • MD5

    b76f861241e4d5d8be2245967faeab4f

  • SHA1

    846de098bac531c3b6e97f66a23720a40b62d425

  • SHA256

    81dbe778761e86e771437b95a3aa6ba6262e21c0a33bba3ad2fb16ed02b5f82b

  • SHA512

    e4d75b413c12f1c946e6f420f4b7c63916d2e0b6a3ce8e251ab32643425619d1ef88deb2a77a292c845001bbef7c42282c6470073b36b41f911784f7ba77f7f7

  • SSDEEP

    1572864:pbMR5wdji2LD7TgeV+dclNF8o33ZJDVgVLbB125La+9:/ji2/gi+dcJ8oZJBEvu5J9

Malware Config

Targets

    • Target

      charlie_the_steak_3.0-APKTodo.apk

    • Size

      67.9MB

    • MD5

      b76f861241e4d5d8be2245967faeab4f

    • SHA1

      846de098bac531c3b6e97f66a23720a40b62d425

    • SHA256

      81dbe778761e86e771437b95a3aa6ba6262e21c0a33bba3ad2fb16ed02b5f82b

    • SHA512

      e4d75b413c12f1c946e6f420f4b7c63916d2e0b6a3ce8e251ab32643425619d1ef88deb2a77a292c845001bbef7c42282c6470073b36b41f911784f7ba77f7f7

    • SSDEEP

      1572864:pbMR5wdji2LD7TgeV+dclNF8o33ZJDVgVLbB125La+9:/ji2/gi+dcJ8oZJBEvu5J9

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Matrix

Tasks