General

  • Target

    fc0e7152746916dd13f11a9249831db559727990d0447b3ec47194f54b516007.bin

  • Size

    4.5MB

  • Sample

    241109-2n6n7atfrb

  • MD5

    5916eba6d0ebb2078d7582c23f6feb80

  • SHA1

    3187a7fed8aa99869ac70b7eb41fc99b60857e9d

  • SHA256

    fc0e7152746916dd13f11a9249831db559727990d0447b3ec47194f54b516007

  • SHA512

    bd0747e579f4fc208f933ba4c54fdbeed07e0611656cf4bf995aa1fe12c6c46cdbf731c53e845e3cea5fc3eedca36976025353bff13c7a502c4812097dde772e

  • SSDEEP

    98304:N/u3AgLgrIIhth5HgK1rNTPBEyhfkvB4/IcG+Sp4q5Vv2:N/u3bc53d/jfEj+8y

Malware Config

Targets

    • Target

      fc0e7152746916dd13f11a9249831db559727990d0447b3ec47194f54b516007.bin

    • Size

      4.5MB

    • MD5

      5916eba6d0ebb2078d7582c23f6feb80

    • SHA1

      3187a7fed8aa99869ac70b7eb41fc99b60857e9d

    • SHA256

      fc0e7152746916dd13f11a9249831db559727990d0447b3ec47194f54b516007

    • SHA512

      bd0747e579f4fc208f933ba4c54fdbeed07e0611656cf4bf995aa1fe12c6c46cdbf731c53e845e3cea5fc3eedca36976025353bff13c7a502c4812097dde772e

    • SSDEEP

      98304:N/u3AgLgrIIhth5HgK1rNTPBEyhfkvB4/IcG+Sp4q5Vv2:N/u3bc53d/jfEj+8y

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks