General

  • Target

    pixelgun.apk

  • Size

    4.4MB

  • Sample

    241103-z2paysvfqp

  • MD5

    01d0afac06d5822dc74c33566b7d1643

  • SHA1

    abd8f8538c16d2a3e79edbb508a4adfe0d16c1ae

  • SHA256

    4f0879fcc3e344a0df463f25171804d1d62d0e2141a536e6b36e78f250133313

  • SHA512

    51428947edfb07e6efb777a572672780f045fc0c80635593e637b1f90e39381d031238436e1d5c3f65f5981faae1095db6b04b5bf47c613288c13bd2ecdcc27b

  • SSDEEP

    98304:0jofEvlIZyU+9bjqMRQ9aCtn6pk1bNkyOOtR2l5mBUgLCr2GA:0jozXtmDYVgyOOtR8A

Malware Config

Targets

    • Target

      pixelgun.apk

    • Size

      4.4MB

    • MD5

      01d0afac06d5822dc74c33566b7d1643

    • SHA1

      abd8f8538c16d2a3e79edbb508a4adfe0d16c1ae

    • SHA256

      4f0879fcc3e344a0df463f25171804d1d62d0e2141a536e6b36e78f250133313

    • SHA512

      51428947edfb07e6efb777a572672780f045fc0c80635593e637b1f90e39381d031238436e1d5c3f65f5981faae1095db6b04b5bf47c613288c13bd2ecdcc27b

    • SSDEEP

      98304:0jofEvlIZyU+9bjqMRQ9aCtn6pk1bNkyOOtR2l5mBUgLCr2GA:0jozXtmDYVgyOOtR8A

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks