General

  • Target

    TouchPrank.apk

  • Size

    601.0MB

  • Sample

    241031-yzpchavkgm

  • MD5

    2a8cbfb140ceec63fc7419ae2af9e13b

  • SHA1

    61d35a1c42dbf01dbe753118ca07b308fd40dc8d

  • SHA256

    e439666d46facf5f33e50a594fd09cdfeaf99d0493978bb66253ff31ab9efc18

  • SHA512

    fae98cbf083b57535d1aac7b2db8b56b8904d539989f38c6df5d407eef6bf6acf82c7574a38dd5da51b5214669150ce81761d96ff1f891c4ba6d7d595a571c7c

  • SSDEEP

    12582912:Ac+ytx8xc1UKkLtdOfjytNTh1NVDA/O9j4zCexaQ2NK/XZNXrdTxJTUtX23rP1Hl:+yMxrJdOfjytFXA29jOC41QK1TvUx23z

Malware Config

Targets

    • Target

      TouchPrank.apk

    • Size

      601.0MB

    • MD5

      2a8cbfb140ceec63fc7419ae2af9e13b

    • SHA1

      61d35a1c42dbf01dbe753118ca07b308fd40dc8d

    • SHA256

      e439666d46facf5f33e50a594fd09cdfeaf99d0493978bb66253ff31ab9efc18

    • SHA512

      fae98cbf083b57535d1aac7b2db8b56b8904d539989f38c6df5d407eef6bf6acf82c7574a38dd5da51b5214669150ce81761d96ff1f891c4ba6d7d595a571c7c

    • SSDEEP

      12582912:Ac+ytx8xc1UKkLtdOfjytNTh1NVDA/O9j4zCexaQ2NK/XZNXrdTxJTUtX23rP1Hl:+yMxrJdOfjytFXA29jOC41QK1TvUx23z

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks