General

  • Target

    eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a.bin

  • Size

    4.7MB

  • Sample

    240818-1yfebazflp

  • MD5

    dda2aae75e193c8aaa5343a50c8eac62

  • SHA1

    3c2d48fe31353fd71c36e07788c238951b4a12f5

  • SHA256

    eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a

  • SHA512

    93c877512a1009bb7730f76e764a5bdff0278b7ddfcbe6bedc3e5b255f5580027bcc3e2edc70c138d0db2189a89a56c13a35a4cfc4d59563849add406975382c

  • SSDEEP

    98304:SLvQgUoJzav7RMHtgFYlEWI8u3OCqjK90sQdjvo:kvQzoAvlMHt9OWOOCq290fvo

Malware Config

Targets

    • Target

      eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a.bin

    • Size

      4.7MB

    • MD5

      dda2aae75e193c8aaa5343a50c8eac62

    • SHA1

      3c2d48fe31353fd71c36e07788c238951b4a12f5

    • SHA256

      eb19575f78b6cf2978baabccdc4f6014d1938eff16df020011f3ced5e7bb8d3a

    • SHA512

      93c877512a1009bb7730f76e764a5bdff0278b7ddfcbe6bedc3e5b255f5580027bcc3e2edc70c138d0db2189a89a56c13a35a4cfc4d59563849add406975382c

    • SSDEEP

      98304:SLvQgUoJzav7RMHtgFYlEWI8u3OCqjK90sQdjvo:kvQzoAvlMHt9OWOOCq290fvo

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks