General

  • Target

    tuflix.apk

  • Size

    23.3MB

  • Sample

    241016-av5xpaybkp

  • MD5

    c9287a87f88d58e695b87c64ae00fe4e

  • SHA1

    321296ce270f73a060dcffdf74b301d6550d25a7

  • SHA256

    c422956f8ab7a15beb902194ae9f6db9863205e0d729a94698928458665a9d2b

  • SHA512

    ebc09a81f331e889b376565f2adf934dc3fd6a8f98b7de409063130d73a24df4a9d9aef3e26fb9e69aafe0374d190088358593f69a64123c3511db114d516e99

  • SSDEEP

    393216:lI7KeX837hohqVswKkz6YNhRt5imkwlt8EKXIo1dW7hOM2Yf5m8:sfXeKqVfKkz6YNNY6ublah/fA8

Malware Config

Targets

    • Target

      tuflix.apk

    • Size

      23.3MB

    • MD5

      c9287a87f88d58e695b87c64ae00fe4e

    • SHA1

      321296ce270f73a060dcffdf74b301d6550d25a7

    • SHA256

      c422956f8ab7a15beb902194ae9f6db9863205e0d729a94698928458665a9d2b

    • SHA512

      ebc09a81f331e889b376565f2adf934dc3fd6a8f98b7de409063130d73a24df4a9d9aef3e26fb9e69aafe0374d190088358593f69a64123c3511db114d516e99

    • SSDEEP

      393216:lI7KeX837hohqVswKkz6YNhRt5imkwlt8EKXIo1dW7hOM2Yf5m8:sfXeKqVfKkz6YNNY6ublah/fA8

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks