General

  • Target

    E5A19AF78939A695E77789C74E1E3A80091F3D2B66DCC5E7DABB74986BAB0B91.apk

  • Size

    7.1MB

  • Sample

    241104-relmjsznhw

  • MD5

    9f3494d2cf58a26369c24eae34b73cd5

  • SHA1

    d3a7c5bbdb70c2a5cbbd9f10b6d86a8d705b3062

  • SHA256

    e5a19af78939a695e77789c74e1e3a80091f3d2b66dcc5e7dabb74986bab0b91

  • SHA512

    8677714db52144bc1de4cffb6c0156ac8949194587b92b0f49a35b11df89dc7b67d070bf851d7bff17d6135e4cda69ec26e7f70f87b7c1a08b27bb473fa1c25d

  • SSDEEP

    196608:h20FkbbjfJJflL6hTYE6OFABchzSZ9ulF1YppLota:hNkbff39q60SweZ9y3Qota

Malware Config

Targets

    • Target

      E5A19AF78939A695E77789C74E1E3A80091F3D2B66DCC5E7DABB74986BAB0B91.apk

    • Size

      7.1MB

    • MD5

      9f3494d2cf58a26369c24eae34b73cd5

    • SHA1

      d3a7c5bbdb70c2a5cbbd9f10b6d86a8d705b3062

    • SHA256

      e5a19af78939a695e77789c74e1e3a80091f3d2b66dcc5e7dabb74986bab0b91

    • SHA512

      8677714db52144bc1de4cffb6c0156ac8949194587b92b0f49a35b11df89dc7b67d070bf851d7bff17d6135e4cda69ec26e7f70f87b7c1a08b27bb473fa1c25d

    • SSDEEP

      196608:h20FkbbjfJJflL6hTYE6OFABchzSZ9ulF1YppLota:hNkbff39q60SweZ9y3Qota

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks