General

  • Target

    573ebddf5af1a0748f4998638af860af849ca3d400f5595bdaebc4d77462a085.zip

  • Size

    4.5MB

  • Sample

    240920-bq1yls1fla

  • MD5

    25030396adc2fba4332b07e17c8c6e87

  • SHA1

    e7ace4de0e6ea014a2cc8f7d0301c1b8ee132893

  • SHA256

    573ebddf5af1a0748f4998638af860af849ca3d400f5595bdaebc4d77462a085

  • SHA512

    7bb871c36bdd9b99450ed97d8f8ff68519cb92109f336165b844a451991cca0af63e50f5a59dfcbd039bee47baccd8ff14803694e77a4e661955efe6952d96fb

  • SSDEEP

    98304:OIVr/spS81vIODktkhOy/rMD0ebD0XD0iD0ExD0nABD09D0OD0Vq9:lVr/spbktkhOyQDVDWD/DbDCkDMDnDow

Malware Config

Targets

    • Target

      573ebddf5af1a0748f4998638af860af849ca3d400f5595bdaebc4d77462a085.zip

    • Size

      4.5MB

    • MD5

      25030396adc2fba4332b07e17c8c6e87

    • SHA1

      e7ace4de0e6ea014a2cc8f7d0301c1b8ee132893

    • SHA256

      573ebddf5af1a0748f4998638af860af849ca3d400f5595bdaebc4d77462a085

    • SHA512

      7bb871c36bdd9b99450ed97d8f8ff68519cb92109f336165b844a451991cca0af63e50f5a59dfcbd039bee47baccd8ff14803694e77a4e661955efe6952d96fb

    • SSDEEP

      98304:OIVr/spS81vIODktkhOy/rMD0ebD0XD0iD0ExD0nABD09D0OD0Vq9:lVr/spbktkhOyQDVDWD/DbDCkDMDnDow

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Requests accessing notifications (often used to intercept notifications before users become aware).

MITRE ATT&CK Mobile v15

Tasks