General

  • Target

    49fdb4eedb1a1b6945068da1171c93667a3aa0e1f3de82d0c02303c476f4414f.bin

  • Size

    1.7MB

  • Sample

    241110-btmv6awfkp

  • MD5

    7da3ff4d693cd73f6e48f59ce1c3336b

  • SHA1

    b267626dc9640c5b598cd5ad1a74fe8ed20711ca

  • SHA256

    49fdb4eedb1a1b6945068da1171c93667a3aa0e1f3de82d0c02303c476f4414f

  • SHA512

    4b49c348f5166977e0818fc111d04468c32c3b91c97ceb4d522d19afd8e9b9a04a1a17ff199dfdca1c1307104c026fe8580f1f1d0ebcb4dd65c4a7a6940a4229

  • SSDEEP

    49152:D4NX8J34GQCScpSixuebo0RH9XJgevqxM:D4+J37xLuMbX56M

Malware Config

Targets

    • Target

      49fdb4eedb1a1b6945068da1171c93667a3aa0e1f3de82d0c02303c476f4414f.bin

    • Size

      1.7MB

    • MD5

      7da3ff4d693cd73f6e48f59ce1c3336b

    • SHA1

      b267626dc9640c5b598cd5ad1a74fe8ed20711ca

    • SHA256

      49fdb4eedb1a1b6945068da1171c93667a3aa0e1f3de82d0c02303c476f4414f

    • SHA512

      4b49c348f5166977e0818fc111d04468c32c3b91c97ceb4d522d19afd8e9b9a04a1a17ff199dfdca1c1307104c026fe8580f1f1d0ebcb4dd65c4a7a6940a4229

    • SSDEEP

      49152:D4NX8J34GQCScpSixuebo0RH9XJgevqxM:D4+J37xLuMbX56M

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks