General

  • Target

    Fake Catch it.apk

  • Size

    11.5MB

  • Sample

    241101-r89lgaznhy

  • MD5

    a01bbbc32766d4ceb754dd5f8ff74e60

  • SHA1

    af5ed8e578881b953f9b9d607773dcfd78acc528

  • SHA256

    013560e97963de21913a59cfea79cedad719aa01306e871614e8d56caf239c47

  • SHA512

    ab08ae1f65bf04d4e12bc8ff55067d0af331b47afd92857ae457c32ec1ae566d838adad3afe5c8597d951688b5a56e52397efe1428802cdf3d6a5ab15cd9105a

  • SSDEEP

    98304:slvm930asfKvPo/KrEVrgvry/XcWVS/s5njbCtCEmMqDNVSZi:wasyErKbWc8juISZi

Malware Config

Targets

    • Target

      Fake Catch it.apk

    • Size

      11.5MB

    • MD5

      a01bbbc32766d4ceb754dd5f8ff74e60

    • SHA1

      af5ed8e578881b953f9b9d607773dcfd78acc528

    • SHA256

      013560e97963de21913a59cfea79cedad719aa01306e871614e8d56caf239c47

    • SHA512

      ab08ae1f65bf04d4e12bc8ff55067d0af331b47afd92857ae457c32ec1ae566d838adad3afe5c8597d951688b5a56e52397efe1428802cdf3d6a5ab15cd9105a

    • SSDEEP

      98304:slvm930asfKvPo/KrEVrgvry/XcWVS/s5njbCtCEmMqDNVSZi:wasyErKbWc8juISZi

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks