General

  • Target

    com.companyname.x_9club-Signed.apk

  • Size

    21.1MB

  • Sample

    240808-eaz8xssglg

  • MD5

    edfaade36b94950302bc7984df36826a

  • SHA1

    a8b3677bfa0287c2c408503fc676219c2d6761e0

  • SHA256

    770d534804934da827f9707f12053027767be7767dea1564ee103da2a26e4814

  • SHA512

    10f9f75da3d7e5a84bea071c183218849d8dbff4d1156aae7af78b04ceea711f1b644e30c86b29d3dbceda717657b822f7f1fcda53e760e726078bb779b49ba0

  • SSDEEP

    393216:4IT2Y9B1xhAjBnqW8QkySlCJPoyWuVSlPsMkhocK3mPWc36+T3KGZYwKf5wfdNp:4IT2Y9B1xhAjJqW8Q5GuSlS+cKfc3ZTN

Malware Config

Targets

    • Target

      com.companyname.x_9club-Signed.apk

    • Size

      21.1MB

    • MD5

      edfaade36b94950302bc7984df36826a

    • SHA1

      a8b3677bfa0287c2c408503fc676219c2d6761e0

    • SHA256

      770d534804934da827f9707f12053027767be7767dea1564ee103da2a26e4814

    • SHA512

      10f9f75da3d7e5a84bea071c183218849d8dbff4d1156aae7af78b04ceea711f1b644e30c86b29d3dbceda717657b822f7f1fcda53e760e726078bb779b49ba0

    • SSDEEP

      393216:4IT2Y9B1xhAjBnqW8QkySlCJPoyWuVSlPsMkhocK3mPWc36+T3KGZYwKf5wfdNp:4IT2Y9B1xhAjJqW8Q5GuSlS+cKfc3ZTN

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks