Resubmissions

09-10-2024 18:21

241009-wzbeja1dmq 8

09-10-2024 18:16

241009-wwsjmsvgmb 8

General

  • Target

    psbmobile.apk

  • Size

    111.4MB

  • Sample

    241009-wwsjmsvgmb

  • MD5

    8828f8690be3b802dcd998c0ce83eb4c

  • SHA1

    2f4ae01348690b35838fd8ea73475724867b9ed9

  • SHA256

    032e60ff6efa035a8490710ec133d1924425f9d8a0219a75a91011e6207d48f5

  • SHA512

    c58fcaddac4fe5fa2ee142d41b54cb993f7cc78ef51ebded9d4d6250ecaff878af57a517f58859edad4570aa0606bbb01f712c127af41a0b4bbf107b6c7bdea4

  • SSDEEP

    3145728:KYlp1LllGNTxw73EcMdeWh1cJ51BHgexoAFra3p:K4lg0UxbPW51BHLoAWp

Malware Config

Targets

    • Target

      psbmobile.apk

    • Size

      111.4MB

    • MD5

      8828f8690be3b802dcd998c0ce83eb4c

    • SHA1

      2f4ae01348690b35838fd8ea73475724867b9ed9

    • SHA256

      032e60ff6efa035a8490710ec133d1924425f9d8a0219a75a91011e6207d48f5

    • SHA512

      c58fcaddac4fe5fa2ee142d41b54cb993f7cc78ef51ebded9d4d6250ecaff878af57a517f58859edad4570aa0606bbb01f712c127af41a0b4bbf107b6c7bdea4

    • SSDEEP

      3145728:KYlp1LllGNTxw73EcMdeWh1cJ51BHgexoAFra3p:K4lg0UxbPW51BHLoAWp

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks