General

  • Target

    9302c068db8a114a9fb782b4b088bfe813eb8a0af4b1754e6223440f2205906c.bin

  • Size

    4.7MB

  • Sample

    240819-1w6tgssbkk

  • MD5

    4ba48f98b6ebcdd82ed3f01101efb067

  • SHA1

    4bbf9f4e3377c8d0fd6b0278e33ad5dafade18d5

  • SHA256

    9302c068db8a114a9fb782b4b088bfe813eb8a0af4b1754e6223440f2205906c

  • SHA512

    8d4b70811d70162064f85898fdad6c2578d41c3a8430228901682e1b130354124284489df72982db1a8d147e24b29d4e5e515a9a1249c2a5bd55ef600d58eb25

  • SSDEEP

    98304:Po60O2DqlYYmA+ZqP6AtO6WHx9edD/+h4LTsXGy0EaPdg:G9hYmnZqiAix9C2iTsXGy0c

Malware Config

Targets

    • Target

      9302c068db8a114a9fb782b4b088bfe813eb8a0af4b1754e6223440f2205906c.bin

    • Size

      4.7MB

    • MD5

      4ba48f98b6ebcdd82ed3f01101efb067

    • SHA1

      4bbf9f4e3377c8d0fd6b0278e33ad5dafade18d5

    • SHA256

      9302c068db8a114a9fb782b4b088bfe813eb8a0af4b1754e6223440f2205906c

    • SHA512

      8d4b70811d70162064f85898fdad6c2578d41c3a8430228901682e1b130354124284489df72982db1a8d147e24b29d4e5e515a9a1249c2a5bd55ef600d58eb25

    • SSDEEP

      98304:Po60O2DqlYYmA+ZqP6AtO6WHx9edD/+h4LTsXGy0EaPdg:G9hYmnZqiAix9C2iTsXGy0c

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks