General

  • Target

    xbrowser_v5.0.1.906_coolapk-15090-o_1ica49h40hn5p5h1aqsi5c110u13-uid-442310.apk

  • Size

    1.9MB

  • Sample

    241110-q33eja1lgk

  • MD5

    1b098d0d4a20ba121366a188577a643c

  • SHA1

    49b82f60d70da5019d07e021b3566f6f1742043f

  • SHA256

    888169a18657fab2ec5e1ef35095f1cf7d7ecb7b4b46dc063050485500a0c0b6

  • SHA512

    e2d018efc3e4c17a42b7d60d81bf5892448ab7314a87b2b9fb6371dcd16ec7955ce582ae5cdefbcadb2a515b61ae8abfd8ac0fb0897bb7fecfa52a7944b9a2bd

  • SSDEEP

    24576:ONdpRCfTErvADz8Ic/F+aeOewuc51qKFKWYpYKJilqluhN1qDV+PhyFz3h0ODi:OjpROY7AU4aeRw38WPsDQsFz3hY

Malware Config

Targets

    • Target

      xbrowser_v5.0.1.906_coolapk-15090-o_1ica49h40hn5p5h1aqsi5c110u13-uid-442310.apk

    • Size

      1.9MB

    • MD5

      1b098d0d4a20ba121366a188577a643c

    • SHA1

      49b82f60d70da5019d07e021b3566f6f1742043f

    • SHA256

      888169a18657fab2ec5e1ef35095f1cf7d7ecb7b4b46dc063050485500a0c0b6

    • SHA512

      e2d018efc3e4c17a42b7d60d81bf5892448ab7314a87b2b9fb6371dcd16ec7955ce582ae5cdefbcadb2a515b61ae8abfd8ac0fb0897bb7fecfa52a7944b9a2bd

    • SSDEEP

      24576:ONdpRCfTErvADz8Ic/F+aeOewuc51qKFKWYpYKJilqluhN1qDV+PhyFz3h0ODi:OjpROY7AU4aeRw38WPsDQsFz3hY

    • A potential corporate email address has been identified in the URL: [email protected]

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks