General

  • Target

    SBI-INT_24072501.apk

  • Size

    13.9MB

  • Sample

    240913-gprw7sxgjp

  • MD5

    3437efd4a25b254b7e2df5d052cb8998

  • SHA1

    9e95561726eb4cd02e066bb591f07d626f145d21

  • SHA256

    2fc33d46ec5accf51b7df026401a5cbe239f0c26edc9fccd433119e3a6a26e09

  • SHA512

    eb78e7f21625e29d1ce8d7abbe905be29d4a86db30da6895fee51b67a66b486f06eaaf57a72161df9d6efbef2e9909ad9d1280a47022dc9e598232355d052d92

  • SSDEEP

    393216:JUwPHxQgXDInvLBVfI0M8oaaWdSsp2zBN66e/OR:D+mInzoGaWdSwkAW

Malware Config

Targets

    • Target

      SBI-INT_24072501.apk

    • Size

      13.9MB

    • MD5

      3437efd4a25b254b7e2df5d052cb8998

    • SHA1

      9e95561726eb4cd02e066bb591f07d626f145d21

    • SHA256

      2fc33d46ec5accf51b7df026401a5cbe239f0c26edc9fccd433119e3a6a26e09

    • SHA512

      eb78e7f21625e29d1ce8d7abbe905be29d4a86db30da6895fee51b67a66b486f06eaaf57a72161df9d6efbef2e9909ad9d1280a47022dc9e598232355d052d92

    • SSDEEP

      393216:JUwPHxQgXDInvLBVfI0M8oaaWdSsp2zBN66e/OR:D+mInzoGaWdSwkAW

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks