General

  • Target

    ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008.bin

  • Size

    2.0MB

  • Sample

    241104-11hx8aybnc

  • MD5

    30ded60b89883bc1e9a137ed6ccd14da

  • SHA1

    92a8475ed1039c1f14f1f2d7cdbaa5fa5d9febcc

  • SHA256

    ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008

  • SHA512

    73a38bd8938b9ebc033157a10b5dba6227ab7b1a26927f8c96a1f89efc794fefab89622f8f15da404552fe9771a4b4ade5d271086a268eccda43f280c2d1fa08

  • SSDEEP

    49152:JP9o340r3oqgf1K+M7YjohrM6A8odU07NQ:JP9q7wf1K+McjgrMOod/S

Malware Config

Targets

    • Target

      ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008.bin

    • Size

      2.0MB

    • MD5

      30ded60b89883bc1e9a137ed6ccd14da

    • SHA1

      92a8475ed1039c1f14f1f2d7cdbaa5fa5d9febcc

    • SHA256

      ad57501cb7ce356467589cea47d8ae86a1421ee50b33cc8388969340e3f96008

    • SHA512

      73a38bd8938b9ebc033157a10b5dba6227ab7b1a26927f8c96a1f89efc794fefab89622f8f15da404552fe9771a4b4ade5d271086a268eccda43f280c2d1fa08

    • SSDEEP

      49152:JP9o340r3oqgf1K+M7YjohrM6A8odU07NQ:JP9q7wf1K+McjgrMOod/S

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks