General

  • Target

    iii.apk

  • Size

    5.0MB

  • Sample

    241101-j321fazphl

  • MD5

    7d8a322b92694d4308353b51ee6f88cb

  • SHA1

    9ec1c73094d4a0ce87c01957d4bc39326a0ec863

  • SHA256

    7231864d8dd0975ff36f051c4970101bdf1b6822b9aee108dbf8f912b9112634

  • SHA512

    df26b67d9af6d32793d0317a851b152d20de47c5a003c1ab67b3d33f62ace75e26957ad3b6abbac5721a597920c03fce8ba733ef750c972020cbf3d1bec4b602

  • SSDEEP

    98304:R7i6W2tlu7hFC0Ktw+62LhXhbOZSSAwuum31pgR+2ydSmJOEIbAc:jtc779uw+6EhcSSL8pg2sCXIb5

Malware Config

Targets

    • Target

      iii.apk

    • Size

      5.0MB

    • MD5

      7d8a322b92694d4308353b51ee6f88cb

    • SHA1

      9ec1c73094d4a0ce87c01957d4bc39326a0ec863

    • SHA256

      7231864d8dd0975ff36f051c4970101bdf1b6822b9aee108dbf8f912b9112634

    • SHA512

      df26b67d9af6d32793d0317a851b152d20de47c5a003c1ab67b3d33f62ace75e26957ad3b6abbac5721a597920c03fce8ba733ef750c972020cbf3d1bec4b602

    • SSDEEP

      98304:R7i6W2tlu7hFC0Ktw+62LhXhbOZSSAwuum31pgR+2ydSmJOEIbAc:jtc779uw+6EhcSSL8pg2sCXIb5

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the phone number (MSISDN for GSM devices)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks