General

  • Target

    ICICI.apk

  • Size

    600KB

  • Sample

    241010-r26k8s1arb

  • MD5

    6eb79f9db3fa631fc35cc860f074dff6

  • SHA1

    9217d868de1aea76e0e7c7bf53b258509fd09cf8

  • SHA256

    1a4bb959272690a7e8e33682713258da239dfb6e0222cb081f7ef39430b6264a

  • SHA512

    8caff1402592030f30ce3a9e2e85d04ff46fc7215423aa1dcd559c057486799002d78ad048e60dc257962285138f57b80684a2cd9be641ead4950f4c97d9e114

  • SSDEEP

    12288:FXOOkY7ydYPUlKlQ5ZQEyB1/tjsSlUNqzoDg1RsO/4:F+OkY7y+lS5ZYtDkqzoTOw

Malware Config

Targets

    • Target

      ICICI.apk

    • Size

      600KB

    • MD5

      6eb79f9db3fa631fc35cc860f074dff6

    • SHA1

      9217d868de1aea76e0e7c7bf53b258509fd09cf8

    • SHA256

      1a4bb959272690a7e8e33682713258da239dfb6e0222cb081f7ef39430b6264a

    • SHA512

      8caff1402592030f30ce3a9e2e85d04ff46fc7215423aa1dcd559c057486799002d78ad048e60dc257962285138f57b80684a2cd9be641ead4950f4c97d9e114

    • SSDEEP

      12288:FXOOkY7ydYPUlKlQ5ZQEyB1/tjsSlUNqzoDg1RsO/4:F+OkY7y+lS5ZYtDkqzoTOw

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks