General

  • Target

    base.apk

  • Size

    2.8MB

  • Sample

    240810-mapfesyhmc

  • MD5

    84164f77738a604232c7e497103d7b80

  • SHA1

    5c466d6e0be3754e8cab2ba2139944b8d89ee749

  • SHA256

    c03ebd3ca7deeb2d7de27a0201aee53298f0810755460d30fb53bb85a5c40ac5

  • SHA512

    74be9810cd4e23b411f6804904bc54938f92d2f5bf44abec16a825c99beb77e224524d2f24ecefcb2a05be95142c7134907185c41c9dce5534cb25d59357f8d8

  • SSDEEP

    49152:/wa6XjRtCjJQ2C0L5jpUuIfvbnU2Ek8ocBlJixY+Mspv9qcXzqWC0eyeI2cyzVZV:/7SjRtCtlppUvnjHcB/i/v9qkzqWC07u

Malware Config

Targets

    • Target

      base.apk

    • Size

      2.8MB

    • MD5

      84164f77738a604232c7e497103d7b80

    • SHA1

      5c466d6e0be3754e8cab2ba2139944b8d89ee749

    • SHA256

      c03ebd3ca7deeb2d7de27a0201aee53298f0810755460d30fb53bb85a5c40ac5

    • SHA512

      74be9810cd4e23b411f6804904bc54938f92d2f5bf44abec16a825c99beb77e224524d2f24ecefcb2a05be95142c7134907185c41c9dce5534cb25d59357f8d8

    • SSDEEP

      49152:/wa6XjRtCjJQ2C0L5jpUuIfvbnU2Ek8ocBlJixY+Mspv9qcXzqWC0eyeI2cyzVZV:/7SjRtCtlppUvnjHcB/i/v9qkzqWC07u

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks