General
-
Target
2d347a7adc345d06745cf2130ff0c657a4acac43e30b572044440f92b718d89b
-
Size
3.0MB
-
Sample
241109-bthanstkbv
-
MD5
e6b68f2b990db550461eb2d305ebae94
-
SHA1
4bb6944a4ee39cff5f42c2929402bd2a0a785ba2
-
SHA256
2d347a7adc345d06745cf2130ff0c657a4acac43e30b572044440f92b718d89b
-
SHA512
6ade834d9044d113791baa70eb98f6818dca52594d444db092a19292d35afd8a013b3d97bf63a2213dfa5e14fa674a39efc502dcb810c9c55accc2f885f2aa23
-
SSDEEP
49152:cC+RrSD3/XNhUyHrfsDGbzViNIkPegpLZrBZIR4R/iv5ofbNUWomfcmTmb77L:cFrA/XUyAql2IkPeSZHIR4xs5ofbNNoh
Static task
static1
Behavioral task
behavioral1
Sample
زيادة متابعين انستقرام_1.0 1155552.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
زيادة متابعين انستقرام_1.0 1155552.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
زيادة متابعين انستقرام_1.0 1155552.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
زيادة متابعين انستقرام_1.0 1155552.apk
-
Size
3.9MB
-
MD5
5b565c11edf5123cc8fceaabfe0b85a7
-
SHA1
440da7d2242fa17338b4398c5e8229b93cdb82d0
-
SHA256
95e7a21e03b5997901fc033aed10121942a1afc06f2e54ddff043fcb9c8590fe
-
SHA512
6856b4e95505a32ae050ff6b2e1ba028d0d88afdd8e7fe3a6d656c8d80252879e3f881ab089eaaa8a387d192664f2f3c3b9aeabcdac5a012e8a349bcb8703082
-
SSDEEP
98304:C2r7MWGCXhIkZVs65nLIZ6NCW+fjTzxzKHD:zfOEeO1IZ6N1+fI
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Reads the contacts stored on the device.
-
Reads the content of SMS inbox messages.
-
Reads the content of the call log.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1