General

  • Target

    Eblagh.apk

  • Size

    3.5MB

  • Sample

    241110-1tebfsyqhk

  • MD5

    f469e4ba7fa3597f21307cb90344b86e

  • SHA1

    7af780d693205b4b5eb1267379ad6b3288374cc2

  • SHA256

    6b0bfc8147b9c360f895595a790db004fb80c93034dd8a29ff2ea78c770da440

  • SHA512

    89e74b9b7e2c1e7b209daec2142a68f2f43f787ce1aa2107598c9e1b10e912cbab88a501ab08cc1e2341bff7a41cbd635a46d7852715e680bc04487677fd252c

  • SSDEEP

    98304:UrIQFwPQ3Ma/HI4YKXq9FoVlf/H5eRI5dLZdB/Hh:UrIQd8a/HIHmiuff58I5nd

Malware Config

Targets

    • Target

      Eblagh.apk

    • Size

      3.5MB

    • MD5

      f469e4ba7fa3597f21307cb90344b86e

    • SHA1

      7af780d693205b4b5eb1267379ad6b3288374cc2

    • SHA256

      6b0bfc8147b9c360f895595a790db004fb80c93034dd8a29ff2ea78c770da440

    • SHA512

      89e74b9b7e2c1e7b209daec2142a68f2f43f787ce1aa2107598c9e1b10e912cbab88a501ab08cc1e2341bff7a41cbd635a46d7852715e680bc04487677fd252c

    • SSDEEP

      98304:UrIQFwPQ3Ma/HI4YKXq9FoVlf/H5eRI5dLZdB/Hh:UrIQd8a/HIHmiuff58I5nd

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks