General

  • Target

    980348db5dffdb2c830f130a2a3f6e36f14f459bb180e0592bdaab4176d890c2.bin

  • Size

    4.5MB

  • Sample

    241112-194laasfkq

  • MD5

    ee6cc3848639364a3100ae48b70ee160

  • SHA1

    c11fd947f602b46beaf7f5303753b4962579d780

  • SHA256

    980348db5dffdb2c830f130a2a3f6e36f14f459bb180e0592bdaab4176d890c2

  • SHA512

    e0bfb719d611e8e46dfb51efa6c0f46533f2783a08fb0d56c62e45f30927bdb87240bec68f3e25dc67f572b6a3e45dffa19afa10434e074c921a8d35d503e526

  • SSDEEP

    98304:cZODfejuz6yhoS5x6k4ZU+oDf6askzs/5EL9Fh35qQBnscMCmiGzfrtELrvHUA2O:sI4uz9hH5xLh+y6askpf55qQBnfGiHLj

Malware Config

Targets

    • Target

      980348db5dffdb2c830f130a2a3f6e36f14f459bb180e0592bdaab4176d890c2.bin

    • Size

      4.5MB

    • MD5

      ee6cc3848639364a3100ae48b70ee160

    • SHA1

      c11fd947f602b46beaf7f5303753b4962579d780

    • SHA256

      980348db5dffdb2c830f130a2a3f6e36f14f459bb180e0592bdaab4176d890c2

    • SHA512

      e0bfb719d611e8e46dfb51efa6c0f46533f2783a08fb0d56c62e45f30927bdb87240bec68f3e25dc67f572b6a3e45dffa19afa10434e074c921a8d35d503e526

    • SSDEEP

      98304:cZODfejuz6yhoS5x6k4ZU+oDf6askzs/5EL9Fh35qQBnscMCmiGzfrtELrvHUA2O:sI4uz9hH5xLh+y6askpf55qQBnfGiHLj

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Legitimate hosting services abused for malware hosting/C2

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks