General

  • Target

    H570.apk

  • Size

    36KB

  • Sample

    241109-rkcltsynaj

  • MD5

    93a3a74fb6f523fd2c418dd6529ad6f1

  • SHA1

    92eceb78ce954a739793b4ad92d85b0d096419f6

  • SHA256

    c99b92ce6e51f5f235884aeb979d36cace131641469f2c12b27d90fd30f7eefd

  • SHA512

    b0eeb93082889fc8fcaf41078eb78e13baeaea717c37e878ca51cac4253624a2a329525180ef7a2478c7bb09148ab4123f6b27712500d6d5c21b45bd84304f48

  • SSDEEP

    768:7FopZbapoLs4LCOs76NFS7ukyiissHGs+b4rP:7CPb+2xs2NFSHyY5srP

Malware Config

Targets

    • Target

      H570.apk

    • Size

      36KB

    • MD5

      93a3a74fb6f523fd2c418dd6529ad6f1

    • SHA1

      92eceb78ce954a739793b4ad92d85b0d096419f6

    • SHA256

      c99b92ce6e51f5f235884aeb979d36cace131641469f2c12b27d90fd30f7eefd

    • SHA512

      b0eeb93082889fc8fcaf41078eb78e13baeaea717c37e878ca51cac4253624a2a329525180ef7a2478c7bb09148ab4123f6b27712500d6d5c21b45bd84304f48

    • SSDEEP

      768:7FopZbapoLs4LCOs76NFS7ukyiissHGs+b4rP:7CPb+2xs2NFSHyY5srP

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks