General

  • Target

    ce7eb26502e7d38c078f4fb5ea3cb7ddd263386eae5e89e3c1ac03e117d5734d.bin

  • Size

    4.6MB

  • Sample

    241107-13ba6ayme1

  • MD5

    a38e75fce1377beab7fe2bd644e1f53c

  • SHA1

    7bff9f8bc1396cfa80d954e98707def5a03fa8de

  • SHA256

    ce7eb26502e7d38c078f4fb5ea3cb7ddd263386eae5e89e3c1ac03e117d5734d

  • SHA512

    d2529b9fa547f0381d830159fc1674a7cf9ca8ec62ac95c536ac945ad812df03e34ccc311c4320f5f441ba1d092caec9dc96858f5e26a13c573181a1729d7c5f

  • SSDEEP

    98304:4/9r/JjSS08Jkf6L57gbfLGJF418aAGzfrtELrvHUA2pF5wvgkX:4fSSBJkyF4aaAHLrXMwvdX

Malware Config

Targets

    • Target

      ce7eb26502e7d38c078f4fb5ea3cb7ddd263386eae5e89e3c1ac03e117d5734d.bin

    • Size

      4.6MB

    • MD5

      a38e75fce1377beab7fe2bd644e1f53c

    • SHA1

      7bff9f8bc1396cfa80d954e98707def5a03fa8de

    • SHA256

      ce7eb26502e7d38c078f4fb5ea3cb7ddd263386eae5e89e3c1ac03e117d5734d

    • SHA512

      d2529b9fa547f0381d830159fc1674a7cf9ca8ec62ac95c536ac945ad812df03e34ccc311c4320f5f441ba1d092caec9dc96858f5e26a13c573181a1729d7c5f

    • SSDEEP

      98304:4/9r/JjSS08Jkf6L57gbfLGJF418aAGzfrtELrvHUA2pF5wvgkX:4fSSBJkyF4aaAHLrXMwvdX

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks