General

  • Target

    16fa07dcfb58275bbeac8f395cb587b95b57772cf0385c4c8a2f00957883d323.bin

  • Size

    4.5MB

  • Sample

    240914-1wt5payfjj

  • MD5

    8b6e60b6a1ac0b8f2cda0a2b40df3397

  • SHA1

    e3a13bebe94caf3a4ce3418c4ffb5497c579f536

  • SHA256

    16fa07dcfb58275bbeac8f395cb587b95b57772cf0385c4c8a2f00957883d323

  • SHA512

    727d8880ae2b1777861831b37b05c922544c962caf6d3d67a08734db3abe0c0a3501ca0c243a9aa15a5e8d210f3ed7afbf9a2fc4c5cdf16e6b3781c824b99cb0

  • SSDEEP

    98304:7AV3U+EYdg+qQvgkqFzfruo/C0X9KecWDjt4SszJ9LVvu1yeWIsbojY:7AxU0P/vdqR/CyhcWDjySszXhU9WIVk

Malware Config

Targets

    • Target

      16fa07dcfb58275bbeac8f395cb587b95b57772cf0385c4c8a2f00957883d323.bin

    • Size

      4.5MB

    • MD5

      8b6e60b6a1ac0b8f2cda0a2b40df3397

    • SHA1

      e3a13bebe94caf3a4ce3418c4ffb5497c579f536

    • SHA256

      16fa07dcfb58275bbeac8f395cb587b95b57772cf0385c4c8a2f00957883d323

    • SHA512

      727d8880ae2b1777861831b37b05c922544c962caf6d3d67a08734db3abe0c0a3501ca0c243a9aa15a5e8d210f3ed7afbf9a2fc4c5cdf16e6b3781c824b99cb0

    • SSDEEP

      98304:7AV3U+EYdg+qQvgkqFzfruo/C0X9KecWDjt4SszJ9LVvu1yeWIsbojY:7AxU0P/vdqR/CyhcWDjySszXhU9WIVk

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Declares services with permission to bind to the system

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests dangerous framework permissions

MITRE ATT&CK Mobile v15

Tasks