General

  • Target

    9f0a149c9cd0ccfc1abb173ed2efd412864e22756836fad4e3473c96574c6eb6.bin

  • Size

    4.7MB

  • Sample

    240817-1zd8mssdpm

  • MD5

    8ec2c18fa23a5ecf7969240a6c009f7b

  • SHA1

    a84b4d8b02674cc9e20591af26ce38616aff0a74

  • SHA256

    9f0a149c9cd0ccfc1abb173ed2efd412864e22756836fad4e3473c96574c6eb6

  • SHA512

    25b720db40badc5c96721ca9da6f6a5abdcf76f8096c186d5b6c2dc497b82ea27dec8565b266069c6b00c786bc0a48ab83a8d745102a7579025bff09db3f1a89

  • SSDEEP

    98304:ns9kmXY/tbOnRULFwUXbH9NvoE2OYaQh0PPdA:nYX2bOnRUpw6pNgE2OHC0y

Malware Config

Targets

    • Target

      9f0a149c9cd0ccfc1abb173ed2efd412864e22756836fad4e3473c96574c6eb6.bin

    • Size

      4.7MB

    • MD5

      8ec2c18fa23a5ecf7969240a6c009f7b

    • SHA1

      a84b4d8b02674cc9e20591af26ce38616aff0a74

    • SHA256

      9f0a149c9cd0ccfc1abb173ed2efd412864e22756836fad4e3473c96574c6eb6

    • SHA512

      25b720db40badc5c96721ca9da6f6a5abdcf76f8096c186d5b6c2dc497b82ea27dec8565b266069c6b00c786bc0a48ab83a8d745102a7579025bff09db3f1a89

    • SSDEEP

      98304:ns9kmXY/tbOnRULFwUXbH9NvoE2OYaQh0PPdA:nYX2bOnRUpw6pNgE2OHC0y

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks