General

  • Target

    Customer Support.s84.apk

  • Size

    5.3MB

  • Sample

    241010-lkdk8sydqp

  • MD5

    d5aeab1fecfdbff3e19f7bd253cc26a3

  • SHA1

    364b6ed46baa9bae8166955b16cfda983a24dcbc

  • SHA256

    a95cb4e94461b1bd6ed3a285371eea580fde3fa90aeaab436266583cc7402202

  • SHA512

    b127135042a94bf2ac08cbc1bae86a8470a49c1a479051e4df93b6c8b64ebb31e8bd48420a55b667e4ea58b919a4fb5b66f8f6d64efb9ef0c9cbea728c0a0be7

  • SSDEEP

    98304:wpe8CSTVINQIbAfiV3lt1svB7fMRW/wt8HNmut7O5tiH:wk8CQV40blYiwSNmbg

Malware Config

Targets

    • Target

      Customer Support.s84.apk

    • Size

      5.3MB

    • MD5

      d5aeab1fecfdbff3e19f7bd253cc26a3

    • SHA1

      364b6ed46baa9bae8166955b16cfda983a24dcbc

    • SHA256

      a95cb4e94461b1bd6ed3a285371eea580fde3fa90aeaab436266583cc7402202

    • SHA512

      b127135042a94bf2ac08cbc1bae86a8470a49c1a479051e4df93b6c8b64ebb31e8bd48420a55b667e4ea58b919a4fb5b66f8f6d64efb9ef0c9cbea728c0a0be7

    • SSDEEP

      98304:wpe8CSTVINQIbAfiV3lt1svB7fMRW/wt8HNmut7O5tiH:wk8CQV40blYiwSNmbg

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks