General

  • Target

    X.apk

  • Size

    25.1MB

  • Sample

    241110-p3rglawpbz

  • MD5

    1baee24401eded5695698c4353f0f958

  • SHA1

    16395f60f4a49a0a0dec37dd7ab43396b4e33574

  • SHA256

    a70f8d74bc0df4c8273d0a20591251dbb7a63cb563ab06e29938179ad69ca8b3

  • SHA512

    9e93df21e33f90f55876ca499d1ad2ccbf11a6cbdb4f0a40b28d9b924ee4eda1858d761dc1a63314b6358c3d82515c2561060c533a225bfa22d115a9ae7da72c

  • SSDEEP

    393216:oRKfCwecSAam6xpBm+1pYsC6NqOYE98UbtpuhxCONejGT67mQHDxhf/yTM2YA0C8:69DmTNzLg3bixCOEK+7HhfqAAJ8

Malware Config

Targets

    • Target

      X.apk

    • Size

      25.1MB

    • MD5

      1baee24401eded5695698c4353f0f958

    • SHA1

      16395f60f4a49a0a0dec37dd7ab43396b4e33574

    • SHA256

      a70f8d74bc0df4c8273d0a20591251dbb7a63cb563ab06e29938179ad69ca8b3

    • SHA512

      9e93df21e33f90f55876ca499d1ad2ccbf11a6cbdb4f0a40b28d9b924ee4eda1858d761dc1a63314b6358c3d82515c2561060c533a225bfa22d115a9ae7da72c

    • SSDEEP

      393216:oRKfCwecSAam6xpBm+1pYsC6NqOYE98UbtpuhxCONejGT67mQHDxhf/yTM2YA0C8:69DmTNzLg3bixCOEK+7HhfqAAJ8

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks