General

  • Target

    0930f4b3c517c39dba2824a4faadf0955cc7b26f64f4d977b9bdc2169abb9e4d.bin

  • Size

    4.7MB

  • Sample

    240809-14n9eawbla

  • MD5

    403db9a48d239d2f39ceec075f32dab5

  • SHA1

    0eca8b6ab1cc45214a74fe2f5bf2d42c4fc03fec

  • SHA256

    0930f4b3c517c39dba2824a4faadf0955cc7b26f64f4d977b9bdc2169abb9e4d

  • SHA512

    ba9e9f12b930fa6b57febb5869c5862a5ebfec5dda575b08ec6358b300e3c5d048b360313cd28c05a08a52039f7a72b48a5a4f52e268bb6830e2c67f540fd78d

  • SSDEEP

    98304:5UItsKfzyd9YG6mXvIkLOCYo7D9By9I0QKPd2:5UfKfzyAG6av1OCYo75B10g

Malware Config

Targets

    • Target

      0930f4b3c517c39dba2824a4faadf0955cc7b26f64f4d977b9bdc2169abb9e4d.bin

    • Size

      4.7MB

    • MD5

      403db9a48d239d2f39ceec075f32dab5

    • SHA1

      0eca8b6ab1cc45214a74fe2f5bf2d42c4fc03fec

    • SHA256

      0930f4b3c517c39dba2824a4faadf0955cc7b26f64f4d977b9bdc2169abb9e4d

    • SHA512

      ba9e9f12b930fa6b57febb5869c5862a5ebfec5dda575b08ec6358b300e3c5d048b360313cd28c05a08a52039f7a72b48a5a4f52e268bb6830e2c67f540fd78d

    • SSDEEP

      98304:5UItsKfzyd9YG6mXvIkLOCYo7D9By9I0QKPd2:5UfKfzyAG6av1OCYo75B10g

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks