General

  • Target

    764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec

  • Size

    38.4MB

  • Sample

    241009-jyj9ts1bma

  • MD5

    afff79347b50a535ea4673e10916e6c6

  • SHA1

    e6ca43b7284d732a728e73191017ba4de2d5ce2f

  • SHA256

    764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec

  • SHA512

    db930c2071202741850593e627b85367172adb369cf29dbec07a4f894c98d93a89cfb02fc0f721698535e9ac0fe5214db1d67b54d514898637ebd6be869f9ce2

  • SSDEEP

    786432:q3cKjxgUIWeirHPMz95M+j3iTCTzOfZ+T83LPDeHnnmzsDvUHT2qbkUQIi:DQxg4yZ5Rwcc+oPDeHnnmzYevkF5

Malware Config

Targets

    • Target

      764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec

    • Size

      38.4MB

    • MD5

      afff79347b50a535ea4673e10916e6c6

    • SHA1

      e6ca43b7284d732a728e73191017ba4de2d5ce2f

    • SHA256

      764d891373d83bdc2b5544a2f0509b346f878dba8148dde1b22ece89456221ec

    • SHA512

      db930c2071202741850593e627b85367172adb369cf29dbec07a4f894c98d93a89cfb02fc0f721698535e9ac0fe5214db1d67b54d514898637ebd6be869f9ce2

    • SSDEEP

      786432:q3cKjxgUIWeirHPMz95M+j3iTCTzOfZ+T83LPDeHnnmzsDvUHT2qbkUQIi:DQxg4yZ5Rwcc+oPDeHnnmzYevkF5

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks