General

  • Target

    43573.apk

  • Size

    6.2MB

  • Sample

    240902-wlv7sawarb

  • MD5

    e2bf29248eec138a13308a7468d24328

  • SHA1

    e733ef650b35dbc7c2fd397b6f7b115600f54f2a

  • SHA256

    aa9d9e70c3991232e6badb50755d57cd252bca4315e03a0b2f3533b699699caa

  • SHA512

    faab5a439be0ccab8439e4cc7a4cd244f99a968cc9358531a2d81fcae199dc328d0b97af3a17376b3c85d588e72bcfa2cb6317ecb1906a2b0998aec71ef8269b

  • SSDEEP

    98304:EzBfIzfrvVXJhUNR5TgThyJjlRw0D4sn69/KqroTVXnBLEc/uEW4ceCH58TSTJy:EzRiLUNPgAlnEDUTLE9eCH3o

Malware Config

Targets

    • Target

      43573.apk

    • Size

      6.2MB

    • MD5

      e2bf29248eec138a13308a7468d24328

    • SHA1

      e733ef650b35dbc7c2fd397b6f7b115600f54f2a

    • SHA256

      aa9d9e70c3991232e6badb50755d57cd252bca4315e03a0b2f3533b699699caa

    • SHA512

      faab5a439be0ccab8439e4cc7a4cd244f99a968cc9358531a2d81fcae199dc328d0b97af3a17376b3c85d588e72bcfa2cb6317ecb1906a2b0998aec71ef8269b

    • SSDEEP

      98304:EzBfIzfrvVXJhUNR5TgThyJjlRw0D4sn69/KqroTVXnBLEc/uEW4ceCH58TSTJy:EzRiLUNPgAlnEDUTLE9eCH3o

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks