General

  • Target

    Cine10Tv.V3.apk

  • Size

    24.6MB

  • Sample

    241110-n1zvhsvrhv

  • MD5

    278b4bffd7f0149dca8cae0ed43ac3e9

  • SHA1

    015111c9e37e4343cf8e0c1943d2a7785c254995

  • SHA256

    8397687cece62b9c559fbc6031d9526ecd3b863c2f4f91b74af02edb951eb028

  • SHA512

    8c1072ca042db9aa9d3b81e57873e280b7cce88a27af42f010d1e8dc865cb6bc2e4255f0ecaa29099ba3a30328d8182082631ce62fa49f435efbdb4573197462

  • SSDEEP

    786432:PtyfPpifp+muDOalttZEtPe0BdBMgHOvxzRe/:PMZiomuK6tLCPtuvZC

Malware Config

Targets

    • Target

      Cine10Tv.V3.apk

    • Size

      24.6MB

    • MD5

      278b4bffd7f0149dca8cae0ed43ac3e9

    • SHA1

      015111c9e37e4343cf8e0c1943d2a7785c254995

    • SHA256

      8397687cece62b9c559fbc6031d9526ecd3b863c2f4f91b74af02edb951eb028

    • SHA512

      8c1072ca042db9aa9d3b81e57873e280b7cce88a27af42f010d1e8dc865cb6bc2e4255f0ecaa29099ba3a30328d8182082631ce62fa49f435efbdb4573197462

    • SSDEEP

      786432:PtyfPpifp+muDOalttZEtPe0BdBMgHOvxzRe/:PMZiomuK6tLCPtuvZC

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks