General

  • Target

    B8U76_.ver.1.0.build.1.apk

  • Size

    2.6MB

  • Sample

    240910-zmvjeswelh

  • MD5

    55b1be60416ac9bce81425afe1e235a6

  • SHA1

    38c6d769f098f056d425b7b4bf4b5f722049a976

  • SHA256

    585a58a92e4cd71abbb7aedd297f263c934439f903759b00d546a9cc2d460ce1

  • SHA512

    dbca326eb90a340da6c6436b0ce60bc8aad25aa82cbf954e9e8fdc03d7745cd2cdc3a174b53152a6d3ef71697bfc615583d719ef8035addf003962d972c775c5

  • SSDEEP

    49152:b3NJLWUfhWPB6NMAKQKNiJhLbNRdZ3jZ9V8jaffHTY0r:jNJLWsoPB6EH8JXhV8+XTn

Malware Config

Targets

    • Target

      B8U76_.ver.1.0.build.1.apk

    • Size

      2.6MB

    • MD5

      55b1be60416ac9bce81425afe1e235a6

    • SHA1

      38c6d769f098f056d425b7b4bf4b5f722049a976

    • SHA256

      585a58a92e4cd71abbb7aedd297f263c934439f903759b00d546a9cc2d460ce1

    • SHA512

      dbca326eb90a340da6c6436b0ce60bc8aad25aa82cbf954e9e8fdc03d7745cd2cdc3a174b53152a6d3ef71697bfc615583d719ef8035addf003962d972c775c5

    • SSDEEP

      49152:b3NJLWUfhWPB6NMAKQKNiJhLbNRdZ3jZ9V8jaffHTY0r:jNJLWsoPB6EH8JXhV8+XTn

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks