General

  • Target

    test.apk

  • Size

    4.5MB

  • Sample

    240811-rz18qstepm

  • MD5

    94435faa5c1335d17a5c174cd24bd2f8

  • SHA1

    9e91e04529aacec8f62ba83d1ec36a5e53b517ef

  • SHA256

    749d6109353872350fb2774c8634d8f0db6c26f8036b5c2d46243ba6535985db

  • SHA512

    dd538aaa75e4a7c9170a24302eef14fb4fd7adaa35bb03c881142f1abc60418297c2af3a8893d6de1e48ba24f30e0e4d4ed2384126edb515b6fe566fdd845f8d

  • SSDEEP

    98304:BZHD7KboltlmgqnPXINRsLT4Oxg9BOUFr9pcBaL7f98Wu:zHabQePXIjtL9drdL71m

Malware Config

Targets

    • Target

      test.apk

    • Size

      4.5MB

    • MD5

      94435faa5c1335d17a5c174cd24bd2f8

    • SHA1

      9e91e04529aacec8f62ba83d1ec36a5e53b517ef

    • SHA256

      749d6109353872350fb2774c8634d8f0db6c26f8036b5c2d46243ba6535985db

    • SHA512

      dd538aaa75e4a7c9170a24302eef14fb4fd7adaa35bb03c881142f1abc60418297c2af3a8893d6de1e48ba24f30e0e4d4ed2384126edb515b6fe566fdd845f8d

    • SSDEEP

      98304:BZHD7KboltlmgqnPXINRsLT4Oxg9BOUFr9pcBaL7f98Wu:zHabQePXIjtL9drdL71m

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks