General

  • Target

    2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab.bin

  • Size

    3.4MB

  • Sample

    241107-11ldcasjgr

  • MD5

    e7cedbfef280ceda133712e7cda8a6a9

  • SHA1

    f7ecec07cbdab327f00fd594eeb34656c0cd9fb2

  • SHA256

    2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab

  • SHA512

    c0e4e04ae624399fafd2fc72f57dc6551491c1786d69cb264ce3a86679cf33beac288f53a1de4d848f61bce4af2f4d27534470117cd820d52b8cd830cddcfdd6

  • SSDEEP

    49152:E3g92xGqdwORv1cgQeWQ9I1iVXExCKt3XCgwRNs3pGDcGmZVIfO+MH:6/wGJpVUxCGwRNs3p36q

Malware Config

Targets

    • Target

      2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab.bin

    • Size

      3.4MB

    • MD5

      e7cedbfef280ceda133712e7cda8a6a9

    • SHA1

      f7ecec07cbdab327f00fd594eeb34656c0cd9fb2

    • SHA256

      2fc4de21ceb15bcb6ba19e48aec52bc24e17c2fc8c49847147d821b5ac8591ab

    • SHA512

      c0e4e04ae624399fafd2fc72f57dc6551491c1786d69cb264ce3a86679cf33beac288f53a1de4d848f61bce4af2f4d27534470117cd820d52b8cd830cddcfdd6

    • SSDEEP

      49152:E3g92xGqdwORv1cgQeWQ9I1iVXExCKt3XCgwRNs3pGDcGmZVIfO+MH:6/wGJpVUxCGwRNs3p36q

    • A potential corporate email address has been identified in the URL: [email protected]

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks