General

  • Target

    materialious.apk

  • Size

    5.2MB

  • Sample

    240908-s4f9sswflg

  • MD5

    0b1ef2534222d6e36ba4674e4869135e

  • SHA1

    d8bbf06328f3584b95cddad86ad73b655caf4986

  • SHA256

    f6e38b2d2438e968bc06c329ac0625cee01a28ba99d216f0e31aa3a345b77dcc

  • SHA512

    610d9fdecf0318bdc4cbe35e6f0463d72bb5f149d81442c2d9f59929f247e71319e82f41e370e0d8ad3e089f007368a40b29b9a47bf227ccb64e8d6fa5853e5d

  • SSDEEP

    98304:phbLVm8ciY9L1tJSxZAqZtD+58eE8O4fqDW9znbMiJCbqtXcme6gMspyrEz7j:X9mjiOHkA5REwfqCRbMiJ0Ip4P

Malware Config

Targets

    • Target

      materialious.apk

    • Size

      5.2MB

    • MD5

      0b1ef2534222d6e36ba4674e4869135e

    • SHA1

      d8bbf06328f3584b95cddad86ad73b655caf4986

    • SHA256

      f6e38b2d2438e968bc06c329ac0625cee01a28ba99d216f0e31aa3a345b77dcc

    • SHA512

      610d9fdecf0318bdc4cbe35e6f0463d72bb5f149d81442c2d9f59929f247e71319e82f41e370e0d8ad3e089f007368a40b29b9a47bf227ccb64e8d6fa5853e5d

    • SSDEEP

      98304:phbLVm8ciY9L1tJSxZAqZtD+58eE8O4fqDW9znbMiJCbqtXcme6gMspyrEz7j:X9mjiOHkA5REwfqCRbMiJ0Ip4P

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks