Resubmissions

09-09-2024 06:12

240909-gx9f8avdpp 10

09-09-2024 06:11

240909-gxt2jaxekc 10

03-09-2024 10:25

240903-mgf3matgml 10

29-07-2024 19:19

240729-x1hexawamq 7

General

  • Target

    Mellat.apk

  • Size

    6.4MB

  • Sample

    240729-x1hexawamq

  • MD5

    9cca6bc6dcd20c4e2e61e21e72bec62c

  • SHA1

    a157d6b9f2ba4bd8124f40a8b3e3d3006b21fa62

  • SHA256

    0bbd59618f244b78e5ef449c183be032096ed408049cf8a130508ffb928f3382

  • SHA512

    bd6310ccd78b474aff7eb317f811e9f326c196bd681bc8a2b697000deb8f44828a620f42b11d43c5e909911eafb38353d6fe4e4be21e2c1055c914e61be3480c

  • SSDEEP

    196608:N9ZCIRe20kC4GwFzQ1bjbYjaF8N5jxyBBfLX:lCIRezkMwG1b/iwy5jxyBBfLX

Malware Config

Targets

    • Target

      Mellat.apk

    • Size

      6.4MB

    • MD5

      9cca6bc6dcd20c4e2e61e21e72bec62c

    • SHA1

      a157d6b9f2ba4bd8124f40a8b3e3d3006b21fa62

    • SHA256

      0bbd59618f244b78e5ef449c183be032096ed408049cf8a130508ffb928f3382

    • SHA512

      bd6310ccd78b474aff7eb317f811e9f326c196bd681bc8a2b697000deb8f44828a620f42b11d43c5e909911eafb38353d6fe4e4be21e2c1055c914e61be3480c

    • SSDEEP

      196608:N9ZCIRe20kC4GwFzQ1bjbYjaF8N5jxyBBfLX:lCIRezkMwG1b/iwy5jxyBBfLX

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Legitimate hosting services abused for malware hosting/C2

    • Queries the mobile country code (MCC)

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks