General

  • Target

    app1839242.apk

  • Size

    28.3MB

  • Sample

    241010-lbpbdayclp

  • MD5

    313dcb9b44c6214bd9ec1f2a4ad37aaa

  • SHA1

    6026d3d01b55c6a542e397fc184e7bc35805d338

  • SHA256

    f4522a760861a3e053f39069942bc5ac446d67e5ed4706993dd75a4f1e05b9ca

  • SHA512

    222de9a5197890e3c70d2ced8f0c8bf7f03b6e1266430126f9c2e7208e4eefe915f4d6fb81a42e7f2528b91ff217111344b1e21450bb0ceae63023de78987454

  • SSDEEP

    786432:/sI/7bVCNz3O3Jo6QLsW6B3q1DZVV+Q6sVUmWJfCUqhENTvw3:V+z36o6OsW6BdQ6QWJ6UJNTvQ

Malware Config

Targets

    • Target

      app1839242.apk

    • Size

      28.3MB

    • MD5

      313dcb9b44c6214bd9ec1f2a4ad37aaa

    • SHA1

      6026d3d01b55c6a542e397fc184e7bc35805d338

    • SHA256

      f4522a760861a3e053f39069942bc5ac446d67e5ed4706993dd75a4f1e05b9ca

    • SHA512

      222de9a5197890e3c70d2ced8f0c8bf7f03b6e1266430126f9c2e7208e4eefe915f4d6fb81a42e7f2528b91ff217111344b1e21450bb0ceae63023de78987454

    • SSDEEP

      786432:/sI/7bVCNz3O3Jo6QLsW6B3q1DZVV+Q6sVUmWJfCUqhENTvw3:V+z36o6OsW6BdQ6QWJ6UJNTvQ

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks