General

  • Target

    ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5.bin

  • Size

    4.5MB

  • Sample

    241104-1xcxss1jfk

  • MD5

    774468d6358206c8037a1d078c572337

  • SHA1

    4af0e1b0afa1ad7615a6c8127a4d19ede56fc084

  • SHA256

    ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5

  • SHA512

    c09fbfdc5607ee064e6ed5e1dc5ae3c838888c4eac8db83072b9a10265919f3df78b2876c413590bdd13e784cfb6f3500bec39721c5339602f4a8182bc3a5e39

  • SSDEEP

    98304:LaR/wDDnDo/6OJ3A9d2sgQNhC3ehGzfrtELrvHUA2pF5wvgkO:LaODLDyJ3A9dRNhzHLrXMwvdO

Malware Config

Targets

    • Target

      ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5.bin

    • Size

      4.5MB

    • MD5

      774468d6358206c8037a1d078c572337

    • SHA1

      4af0e1b0afa1ad7615a6c8127a4d19ede56fc084

    • SHA256

      ee1a28f00a200589d07bad252731c0d8f30572b8882fd57abb140f61f58f41f5

    • SHA512

      c09fbfdc5607ee064e6ed5e1dc5ae3c838888c4eac8db83072b9a10265919f3df78b2876c413590bdd13e784cfb6f3500bec39721c5339602f4a8182bc3a5e39

    • SSDEEP

      98304:LaR/wDDnDo/6OJ3A9d2sgQNhC3ehGzfrtELrvHUA2pF5wvgkO:LaODLDyJ3A9dRNhzHLrXMwvdO

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks