General

  • Target

    base.apk

  • Size

    2.8MB

  • Sample

    240912-hmaqkswgqg

  • MD5

    109a6d4475e2a75f80dd1d4cefae7200

  • SHA1

    36915de350398161cf825265b9fec0c702263f55

  • SHA256

    0e51613c7e0956d96cdc76ae1f44f45d1e72b94115ed60d6b0a9eb1620e2b84a

  • SHA512

    a163e82a57ab9631c2d50651fd9ed1cee3d4b342bd4f24c0adc7a253e18f9af04e89baf25a289796a420d0bf77971c5f1df9a2442ba309024310c58f1e338d93

  • SSDEEP

    49152:WKu2GSlhq+gpveu9LJOwtQMCY9Guk/Bkoa3lNf0viCsjRCOQEbTMozt:jGSl0veuDCMk/GoajySjRCynt

Malware Config

Targets

    • Target

      base.apk

    • Size

      2.8MB

    • MD5

      109a6d4475e2a75f80dd1d4cefae7200

    • SHA1

      36915de350398161cf825265b9fec0c702263f55

    • SHA256

      0e51613c7e0956d96cdc76ae1f44f45d1e72b94115ed60d6b0a9eb1620e2b84a

    • SHA512

      a163e82a57ab9631c2d50651fd9ed1cee3d4b342bd4f24c0adc7a253e18f9af04e89baf25a289796a420d0bf77971c5f1df9a2442ba309024310c58f1e338d93

    • SSDEEP

      49152:WKu2GSlhq+gpveu9LJOwtQMCY9Guk/Bkoa3lNf0viCsjRCOQEbTMozt:jGSl0veuDCMk/GoajySjRCynt

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks