General

  • Target

    base.apk

  • Size

    2.8MB

  • Sample

    240912-jm6npaydra

  • MD5

    312f62cb1d160b5fa58c811a0cc1d99b

  • SHA1

    5aa873bad2b9be6b350db47e67ef5dbf3379dd49

  • SHA256

    4e6dcfd43f37fde88b39f1f97c5079fcdce94cc75a5612f389454fb5fdd9868a

  • SHA512

    f4f4c3f1c6c509f734e5588c519cd9ce680acadc62d90038431a06106158759ca9d1be1a7606654ac54e6c11f2643ede468a223b83bf7ebfe9fe80d7336003f8

  • SSDEEP

    49152:vKu2GSlhq+gpveu9LJOwtQMCY9Guk/Bkoa3lNf0viCsjRCOQEbTbbDj:SGSl0veuDCMk/GoajySjRCyLj

Malware Config

Targets

    • Target

      base.apk

    • Size

      2.8MB

    • MD5

      312f62cb1d160b5fa58c811a0cc1d99b

    • SHA1

      5aa873bad2b9be6b350db47e67ef5dbf3379dd49

    • SHA256

      4e6dcfd43f37fde88b39f1f97c5079fcdce94cc75a5612f389454fb5fdd9868a

    • SHA512

      f4f4c3f1c6c509f734e5588c519cd9ce680acadc62d90038431a06106158759ca9d1be1a7606654ac54e6c11f2643ede468a223b83bf7ebfe9fe80d7336003f8

    • SSDEEP

      49152:vKu2GSlhq+gpveu9LJOwtQMCY9Guk/Bkoa3lNf0viCsjRCOQEbTbbDj:SGSl0veuDCMk/GoajySjRCyLj

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks