General

  • Target

    Apktool_M_v2.4.0-2411022024110201.apk

  • Size

    14.6MB

  • Sample

    241105-bd2pdasajp

  • MD5

    0ca2010676c3fa52caf3de03240dcbb0

  • SHA1

    a49071d3b6b574ff84d3aab8577a57b05e25592f

  • SHA256

    e84bdab8c76e3da5a546987785360e75d5311ad417c7c025103e5e26b89583a3

  • SHA512

    86c15046374b043482a2a2ae71c5a803461d34236d4aa7fcc082e58fdb4481011510a8da1a46e0a970f47a5584b13533a2d273d30ec0dacf3aa41c4db5f16fa6

  • SSDEEP

    196608:ypeF6FEviy1hxiQelQ+um3r/NRQxTovH2mAkF20jiEgmqugO3tikaRr9FfWS:SeoFEv3NsFumTMTovHSEgnujokaheS

Malware Config

Targets

    • Target

      Apktool_M_v2.4.0-2411022024110201.apk

    • Size

      14.6MB

    • MD5

      0ca2010676c3fa52caf3de03240dcbb0

    • SHA1

      a49071d3b6b574ff84d3aab8577a57b05e25592f

    • SHA256

      e84bdab8c76e3da5a546987785360e75d5311ad417c7c025103e5e26b89583a3

    • SHA512

      86c15046374b043482a2a2ae71c5a803461d34236d4aa7fcc082e58fdb4481011510a8da1a46e0a970f47a5584b13533a2d273d30ec0dacf3aa41c4db5f16fa6

    • SSDEEP

      196608:ypeF6FEviy1hxiQelQ+um3r/NRQxTovH2mAkF20jiEgmqugO3tikaRr9FfWS:SeoFEv3NsFumTMTovHSEgnujokaheS

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks