General

  • Target

    12868393899490795126447922726795263icici-reward.apk

  • Size

    2.7MB

  • Sample

    241104-jkcb3axdld

  • MD5

    968f6fa5f24f0848449d0c6a491e6587

  • SHA1

    0b56bc08a6f0068eb2b85761c897bdac81a0356f

  • SHA256

    0aebd90ac204ae0a181c568a4f6e9e02cd7bb4fa231e7a8a6a74d841dd9599fd

  • SHA512

    582ee4ef3c5c583336cec303caba2257e4249685d31ac71732bc38378c5a493ffce9be4553ff24303a59ad7f803c14d489c70ba9329ebcfbbf80cdd8fa6ad418

  • SSDEEP

    49152:mi/dWuxlWDj+23Qu8w5ldxYa1xo1YD5bEjaDTKkR/w4gKZ3wJS:mWUyl+j+ub5l0a1W1YD5bEjaHKk1DZ3R

Malware Config

Targets

    • Target

      12868393899490795126447922726795263icici-reward.apk

    • Size

      2.7MB

    • MD5

      968f6fa5f24f0848449d0c6a491e6587

    • SHA1

      0b56bc08a6f0068eb2b85761c897bdac81a0356f

    • SHA256

      0aebd90ac204ae0a181c568a4f6e9e02cd7bb4fa231e7a8a6a74d841dd9599fd

    • SHA512

      582ee4ef3c5c583336cec303caba2257e4249685d31ac71732bc38378c5a493ffce9be4553ff24303a59ad7f803c14d489c70ba9329ebcfbbf80cdd8fa6ad418

    • SSDEEP

      49152:mi/dWuxlWDj+23Qu8w5ldxYa1xo1YD5bEjaDTKkR/w4gKZ3wJS:mWUyl+j+ub5l0a1W1YD5bEjaHKk1DZ3R

    • Checks Android system properties for emulator presence.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Requests changing the default SMS application.

MITRE ATT&CK Mobile v15

Tasks