General

  • Target

    app.apk

  • Size

    14.0MB

  • Sample

    240726-qmxjcaterf

  • MD5

    6c95fd1b9364d6d5f5733e04b5cb9b22

  • SHA1

    a1227308729d5322007dcbf52a4a281d30c20265

  • SHA256

    e23f50927a4fbf7c0c6cf176fac5bbacd132c89687fcca3c8a6d57675ad20884

  • SHA512

    44305e7a723d54500f1380cf8a4a51eabee8a6055d0fb6fdef07d8a994f39b1d12bede8c34226be016511be648c419d9f4d4915467604e447113aead8de359bc

  • SSDEEP

    393216:S7XoVMGJywWBY+zhCDJwTpLuwrWE8NsGEJLZ7jKQ:S7Xo6wUK90ph16Nc7jR

Malware Config

Targets

    • Target

      app.apk

    • Size

      14.0MB

    • MD5

      6c95fd1b9364d6d5f5733e04b5cb9b22

    • SHA1

      a1227308729d5322007dcbf52a4a281d30c20265

    • SHA256

      e23f50927a4fbf7c0c6cf176fac5bbacd132c89687fcca3c8a6d57675ad20884

    • SHA512

      44305e7a723d54500f1380cf8a4a51eabee8a6055d0fb6fdef07d8a994f39b1d12bede8c34226be016511be648c419d9f4d4915467604e447113aead8de359bc

    • SSDEEP

      393216:S7XoVMGJywWBY+zhCDJwTpLuwrWE8NsGEJLZ7jKQ:S7Xo6wUK90ph16Nc7jR

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks