General

  • Target

    i288_v2.apk

  • Size

    48.1MB

  • Sample

    241111-c7jlbszpaz

  • MD5

    3aeadfbe530f47d7c1f37025814a1f9a

  • SHA1

    289eced5a02e109312cea95cff1625114187cbdb

  • SHA256

    c8c6f9a284d8cf6bbf49e9f2b38ff696a0a73c7ea48aed28a67a20232713088e

  • SHA512

    f77b841cc2d715590495b3270bc6985a8191bfa12fb8858feb180cfa6f7679d520784c5fab7b4a719b5cbda661f1efe418a8a13849d059caa32248f9a8a74e57

  • SSDEEP

    786432:uim8FTNaJIbXiGnooDxvO9md1IN++1gSUTtNAeumLr+im8FTN5JIbZ:YyTNaJI5oavNAbmLrIyTN5JI9

Malware Config

Targets

    • Target

      i288_v2.apk

    • Size

      48.1MB

    • MD5

      3aeadfbe530f47d7c1f37025814a1f9a

    • SHA1

      289eced5a02e109312cea95cff1625114187cbdb

    • SHA256

      c8c6f9a284d8cf6bbf49e9f2b38ff696a0a73c7ea48aed28a67a20232713088e

    • SHA512

      f77b841cc2d715590495b3270bc6985a8191bfa12fb8858feb180cfa6f7679d520784c5fab7b4a719b5cbda661f1efe418a8a13849d059caa32248f9a8a74e57

    • SSDEEP

      786432:uim8FTNaJIbXiGnooDxvO9md1IN++1gSUTtNAeumLr+im8FTN5JIbZ:YyTNaJI5oavNAbmLrIyTN5JI9

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks