General

  • Target

    d305da75f52d66605ff9c4bb93ffc6dc9fb8ca4734af8c46adcb2c8e7c0ee824.bin

  • Size

    4.6MB

  • Sample

    241108-2qvpps1gla

  • MD5

    9f9573abad69578d25f71835f8be5bd6

  • SHA1

    74a19eebf83bb813eb246d19a8822d5ba05b3ec0

  • SHA256

    d305da75f52d66605ff9c4bb93ffc6dc9fb8ca4734af8c46adcb2c8e7c0ee824

  • SHA512

    8bc7df1ec56467519c37dd3bc64efbc1dd82abe46fa33eda578c0ff2ab18cfa8824f61f8d967a09f0ab7068617aa4084249bdd34da31d363d61d9bd09fb94165

  • SSDEEP

    98304:wFYvWVi5sAgK3pUvbsRFexMgD2dClC121I6ajUGzfrtELrvHUA2pF5wvgkH6:w2vB3GbsRFexXyV1wCUHLrXMwvda

Malware Config

Targets

    • Target

      d305da75f52d66605ff9c4bb93ffc6dc9fb8ca4734af8c46adcb2c8e7c0ee824.bin

    • Size

      4.6MB

    • MD5

      9f9573abad69578d25f71835f8be5bd6

    • SHA1

      74a19eebf83bb813eb246d19a8822d5ba05b3ec0

    • SHA256

      d305da75f52d66605ff9c4bb93ffc6dc9fb8ca4734af8c46adcb2c8e7c0ee824

    • SHA512

      8bc7df1ec56467519c37dd3bc64efbc1dd82abe46fa33eda578c0ff2ab18cfa8824f61f8d967a09f0ab7068617aa4084249bdd34da31d363d61d9bd09fb94165

    • SSDEEP

      98304:wFYvWVi5sAgK3pUvbsRFexMgD2dClC121I6ajUGzfrtELrvHUA2pF5wvgkH6:w2vB3GbsRFexXyV1wCUHLrXMwvda

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks