General

  • Target

    72fcc0c96ef682744ff99ec4313bd7c7da90fed4ab027903f7d750f5412ec77f.bin

  • Size

    4.8MB

  • Sample

    241015-1zgzjatepp

  • MD5

    dc26d8882d46d9d5d51f0290ce1ba3d3

  • SHA1

    5f436951f40e60f3581f33af2ef438a64cfe380e

  • SHA256

    72fcc0c96ef682744ff99ec4313bd7c7da90fed4ab027903f7d750f5412ec77f

  • SHA512

    2203cdd18c87f7e60c8829a7e99f7b2bbbd81a76d87c906b167662aaae21854a0f521c3446b970eed8bbb0cf6a12d82af4522341c1d48b5cd714a30d05e0bc74

  • SSDEEP

    98304:LtUr+gJa3FpcrcQg4vHGrv5H0ykt11xXtUE6+a0E:LS7a3F2r8wHM5Mt11xdUea/

Malware Config

Targets

    • Target

      72fcc0c96ef682744ff99ec4313bd7c7da90fed4ab027903f7d750f5412ec77f.bin

    • Size

      4.8MB

    • MD5

      dc26d8882d46d9d5d51f0290ce1ba3d3

    • SHA1

      5f436951f40e60f3581f33af2ef438a64cfe380e

    • SHA256

      72fcc0c96ef682744ff99ec4313bd7c7da90fed4ab027903f7d750f5412ec77f

    • SHA512

      2203cdd18c87f7e60c8829a7e99f7b2bbbd81a76d87c906b167662aaae21854a0f521c3446b970eed8bbb0cf6a12d82af4522341c1d48b5cd714a30d05e0bc74

    • SSDEEP

      98304:LtUr+gJa3FpcrcQg4vHGrv5H0ykt11xXtUE6+a0E:LS7a3F2r8wHM5Mt11xdUea/

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks