General

  • Target

    base.apk

  • Size

    2.7MB

  • Sample

    240817-q2vcjaycnc

  • MD5

    0ab9ec86b5d33b8c4e10be8cae550810

  • SHA1

    a535aafe5f236cf4ae0248d3eb13271ef1a7749f

  • SHA256

    643c1d5240fe9bc4c4beb2799d6647db58c35f8ac0ef40715c9b4a30f12cb4a3

  • SHA512

    a2842a54622e122b75b0be9353aa82d1104cca5ed4fc706482205389b0065a4757218950589432d1e7bfe7ab8a796fc24c8e75f5ba2311f30a2849ee9785d94f

  • SSDEEP

    49152:M/rWK7M6cakjvjyQrmVqjnkCmgXVA5ovP9ucIjRwwNPM/3UrqKsUQtnzjJshp:aSn6caUvjVKVZJglHXuuDCitzVsT

Malware Config

Targets

    • Target

      base.apk

    • Size

      2.7MB

    • MD5

      0ab9ec86b5d33b8c4e10be8cae550810

    • SHA1

      a535aafe5f236cf4ae0248d3eb13271ef1a7749f

    • SHA256

      643c1d5240fe9bc4c4beb2799d6647db58c35f8ac0ef40715c9b4a30f12cb4a3

    • SHA512

      a2842a54622e122b75b0be9353aa82d1104cca5ed4fc706482205389b0065a4757218950589432d1e7bfe7ab8a796fc24c8e75f5ba2311f30a2849ee9785d94f

    • SSDEEP

      49152:M/rWK7M6cakjvjyQrmVqjnkCmgXVA5ovP9ucIjRwwNPM/3UrqKsUQtnzjJshp:aSn6caUvjVKVZJglHXuuDCitzVsT

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks