General

  • Target

    511640d6bfe8773f4deb69406802907904d796d3a1c59dadd2657c2d1f74b56e.bin

  • Size

    4.7MB

  • Sample

    241108-2mzjgs1gml

  • MD5

    dc5b2ee3ffbaac12e79223503e79467d

  • SHA1

    4e10dd0279baef663e96638d09bc272e8971aca0

  • SHA256

    511640d6bfe8773f4deb69406802907904d796d3a1c59dadd2657c2d1f74b56e

  • SHA512

    bef11b00fbbffd687e54175dffd79a1b39b14703c9f780c4f4c3c4e814ca54dbd0c4a8b36bd3e3c598b2b9fa411d89df60a13b7720ef0d75e9e53e9b1a5cf810

  • SSDEEP

    98304:0oV91XD2GicsLZcGFycTsdcUNUuhSVwNohM0gaYSb9qXRBOma+G:0A9RLHsLWHhUqqOaYoqXeH5

Malware Config

Targets

    • Target

      511640d6bfe8773f4deb69406802907904d796d3a1c59dadd2657c2d1f74b56e.bin

    • Size

      4.7MB

    • MD5

      dc5b2ee3ffbaac12e79223503e79467d

    • SHA1

      4e10dd0279baef663e96638d09bc272e8971aca0

    • SHA256

      511640d6bfe8773f4deb69406802907904d796d3a1c59dadd2657c2d1f74b56e

    • SHA512

      bef11b00fbbffd687e54175dffd79a1b39b14703c9f780c4f4c3c4e814ca54dbd0c4a8b36bd3e3c598b2b9fa411d89df60a13b7720ef0d75e9e53e9b1a5cf810

    • SSDEEP

      98304:0oV91XD2GicsLZcGFycTsdcUNUuhSVwNohM0gaYSb9qXRBOma+G:0A9RLHsLWHhUqqOaYoqXeH5

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests dangerous framework permissions

MITRE ATT&CK Mobile v15

Tasks