General

  • Target

    app.apk

  • Size

    2.7MB

  • Sample

    241019-2repwatemg

  • MD5

    d40cdcca1b1ea83faadc4c9a8d821934

  • SHA1

    7cbaad91f36d3170c43b2f8793ccf5bfabbf3727

  • SHA256

    500b2fbd1e1d8397b4363f7136946fdd57bb770f1397d734dea39bc7ce13a065

  • SHA512

    8e019b6d69c559345d991700036af7b3ed2d87a46339ad56326755e7c8651be8d2877e1654840338cccdeb32680cae30bcab7853fcd0da5838f1c8052b8d1d57

  • SSDEEP

    49152:XY8/YREATUv2GxWViNTOFzRVDC1L3Nf8SMjQwbIinAfTy6eEMmx4RN07mPt1TnzH:o8AREATUvFx/NaFzrAL9MDbhAby6edTj

Malware Config

Targets

    • Target

      app.apk

    • Size

      2.7MB

    • MD5

      d40cdcca1b1ea83faadc4c9a8d821934

    • SHA1

      7cbaad91f36d3170c43b2f8793ccf5bfabbf3727

    • SHA256

      500b2fbd1e1d8397b4363f7136946fdd57bb770f1397d734dea39bc7ce13a065

    • SHA512

      8e019b6d69c559345d991700036af7b3ed2d87a46339ad56326755e7c8651be8d2877e1654840338cccdeb32680cae30bcab7853fcd0da5838f1c8052b8d1d57

    • SSDEEP

      49152:XY8/YREATUv2GxWViNTOFzRVDC1L3Nf8SMjQwbIinAfTy6eEMmx4RN07mPt1TnzH:o8AREATUvFx/NaFzrAL9MDbhAby6edTj

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.