General

  • Target

    app.apk

  • Size

    2.7MB

  • Sample

    241019-2w1sxawdqj

  • MD5

    d40cdcca1b1ea83faadc4c9a8d821934

  • SHA1

    7cbaad91f36d3170c43b2f8793ccf5bfabbf3727

  • SHA256

    500b2fbd1e1d8397b4363f7136946fdd57bb770f1397d734dea39bc7ce13a065

  • SHA512

    8e019b6d69c559345d991700036af7b3ed2d87a46339ad56326755e7c8651be8d2877e1654840338cccdeb32680cae30bcab7853fcd0da5838f1c8052b8d1d57

  • SSDEEP

    49152:XY8/YREATUv2GxWViNTOFzRVDC1L3Nf8SMjQwbIinAfTy6eEMmx4RN07mPt1TnzH:o8AREATUvFx/NaFzrAL9MDbhAby6edTj

Malware Config

Targets

    • Target

      app.apk

    • Size

      2.7MB

    • MD5

      d40cdcca1b1ea83faadc4c9a8d821934

    • SHA1

      7cbaad91f36d3170c43b2f8793ccf5bfabbf3727

    • SHA256

      500b2fbd1e1d8397b4363f7136946fdd57bb770f1397d734dea39bc7ce13a065

    • SHA512

      8e019b6d69c559345d991700036af7b3ed2d87a46339ad56326755e7c8651be8d2877e1654840338cccdeb32680cae30bcab7853fcd0da5838f1c8052b8d1d57

    • SSDEEP

      49152:XY8/YREATUv2GxWViNTOFzRVDC1L3Nf8SMjQwbIinAfTy6eEMmx4RN07mPt1TnzH:o8AREATUvFx/NaFzrAL9MDbhAby6edTj

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks