General

  • Target

    c7e49df4478dab868fd8ab42272216c74bbc427a871b1def69c41d7edc403a2b.bin

  • Size

    4.5MB

  • Sample

    241108-2ne68stqdl

  • MD5

    67a1a3323e35ffa32ba4e7aecb6866c3

  • SHA1

    2e353d2960e50c7327c513d8020c39046fba06c3

  • SHA256

    c7e49df4478dab868fd8ab42272216c74bbc427a871b1def69c41d7edc403a2b

  • SHA512

    9c48c7583aec21b311ab6cbefdbc5aa26726a3cd2c05d40c44662cad1876485bd5219fa2f02349ca5721d23e73deb73f03f46911cc5a3b00f7102a7f54b3f010

  • SSDEEP

    98304:K5Rq08Rq0WUdgdmI16R8xq+cLBM8Rvpyu4kp5wiSvGRq0jQdhYRq0edjdmRq06:y80880WUdgdmI1uLvpz4kMiSe800dhYI

Malware Config

Targets

    • Target

      c7e49df4478dab868fd8ab42272216c74bbc427a871b1def69c41d7edc403a2b.bin

    • Size

      4.5MB

    • MD5

      67a1a3323e35ffa32ba4e7aecb6866c3

    • SHA1

      2e353d2960e50c7327c513d8020c39046fba06c3

    • SHA256

      c7e49df4478dab868fd8ab42272216c74bbc427a871b1def69c41d7edc403a2b

    • SHA512

      9c48c7583aec21b311ab6cbefdbc5aa26726a3cd2c05d40c44662cad1876485bd5219fa2f02349ca5721d23e73deb73f03f46911cc5a3b00f7102a7f54b3f010

    • SSDEEP

      98304:K5Rq08Rq0WUdgdmI16R8xq+cLBM8Rvpyu4kp5wiSvGRq0jQdhYRq0edjdmRq06:y80880WUdgdmI1uLvpz4kMiSe800dhYI

    • A potential corporate email address has been identified in the URL: [email protected]

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks