General

  • Target

    lesehantoto_1.0.0.apk

  • Size

    4.6MB

  • Sample

    240729-2cscesyamf

  • MD5

    80a8fb80aa38d2e2b84ac24c7ded90ff

  • SHA1

    778a4d5eb9ffc71eaf0aa35624e1e4f441b214b1

  • SHA256

    8f0552a3769cf916f03164f8fdfdda03c67ed50c15c360ce0e340e5e6107abae

  • SHA512

    308a6fbf096f58462b59716953681e53c06c00cfc4644d679598b07f9d9f1370c8cc19e26bc81c403b8d84109a8a69b96d8799585addb697ccb472a3425b3852

  • SSDEEP

    98304:p6F9AVu+tNKqxxR174lyOZithSwDvn/yi1aN3ncgLCr4Gu:p6LAY6xRB4lyZs2vn/W36u

Malware Config

Targets

    • Target

      lesehantoto_1.0.0.apk

    • Size

      4.6MB

    • MD5

      80a8fb80aa38d2e2b84ac24c7ded90ff

    • SHA1

      778a4d5eb9ffc71eaf0aa35624e1e4f441b214b1

    • SHA256

      8f0552a3769cf916f03164f8fdfdda03c67ed50c15c360ce0e340e5e6107abae

    • SHA512

      308a6fbf096f58462b59716953681e53c06c00cfc4644d679598b07f9d9f1370c8cc19e26bc81c403b8d84109a8a69b96d8799585addb697ccb472a3425b3852

    • SSDEEP

      98304:p6F9AVu+tNKqxxR174lyOZithSwDvn/yi1aN3ncgLCr4Gu:p6LAY6xRB4lyZs2vn/W36u

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks