General

  • Target

    NetherSX2 .apk

  • Size

    20.0MB

  • Sample

    241111-196qmsyaqb

  • MD5

    7ed90236017b7aa5345c88459fbd9bb2

  • SHA1

    1f29f3e4242f3539a6062e2781ac51affd2accbb

  • SHA256

    cffe4bc962bdb87ebc74ec5dd6cf058c8e5c364cee93909c2943d12799e69ccf

  • SHA512

    395921d42bff1164f4a7a15f945825bff72d765b8974fd6f0c50c54dd2f2e0825891dc94ea6b417318e6f644f237e98a2753aecc965a18932dea52cba255f7e2

  • SSDEEP

    196608:aosnB+uJ83DsNn+8RSSqQVHgJlsz9Tu34tCtwqpyqxqJ78fy21oAILmSxTxchKPk:aogD8gn+8RSilqpy9Wy3AILmSxVcN

Malware Config

Targets

    • Target

      NetherSX2 .apk

    • Size

      20.0MB

    • MD5

      7ed90236017b7aa5345c88459fbd9bb2

    • SHA1

      1f29f3e4242f3539a6062e2781ac51affd2accbb

    • SHA256

      cffe4bc962bdb87ebc74ec5dd6cf058c8e5c364cee93909c2943d12799e69ccf

    • SHA512

      395921d42bff1164f4a7a15f945825bff72d765b8974fd6f0c50c54dd2f2e0825891dc94ea6b417318e6f644f237e98a2753aecc965a18932dea52cba255f7e2

    • SSDEEP

      196608:aosnB+uJ83DsNn+8RSSqQVHgJlsz9Tu34tCtwqpyqxqJ78fy21oAILmSxTxchKPk:aogD8gn+8RSilqpy9Wy3AILmSxVcN

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks