General

  • Target

    test.apk

  • Size

    6.2MB

  • Sample

    241103-lnj77azqcv

  • MD5

    d77743ed2417bd5b04a167994e2c91a5

  • SHA1

    5109d579fc1cd06f54ac3e947bd2ffb7f161b726

  • SHA256

    c9c96b84f575c696924e16dcfdc0b0a93b39d9a31a5c0fcce31a662a56a39863

  • SHA512

    473226db537c5c300fdd96f7c80730501771bbd866b0e287ab610b23cf2ad739bfdf6c0a06e801474176530a489847a7882ee3a1f62ecfc3414512c7229dc4c5

  • SSDEEP

    196608:VZ5iXh2vtPQq1bo/tZXck2yLH5CtXvVS1B:KetYuboDMiH52Y1B

Malware Config

Targets

    • Target

      test.apk

    • Size

      6.2MB

    • MD5

      d77743ed2417bd5b04a167994e2c91a5

    • SHA1

      5109d579fc1cd06f54ac3e947bd2ffb7f161b726

    • SHA256

      c9c96b84f575c696924e16dcfdc0b0a93b39d9a31a5c0fcce31a662a56a39863

    • SHA512

      473226db537c5c300fdd96f7c80730501771bbd866b0e287ab610b23cf2ad739bfdf6c0a06e801474176530a489847a7882ee3a1f62ecfc3414512c7229dc4c5

    • SSDEEP

      196608:VZ5iXh2vtPQq1bo/tZXck2yLH5CtXvVS1B:KetYuboDMiH52Y1B

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks