General

  • Target

    aumentar-memoria-ram-interna-copy-5-0-0.apk

  • Size

    7.3MB

  • Sample

    241113-wjrftawkf1

  • MD5

    aa59f02b4e95ee3fdd00ae55978deb4e

  • SHA1

    3cd2fe989376cfe82a82ff6550586854c337d0b0

  • SHA256

    262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf

  • SHA512

    11566126fa01365eaf1cdef7bb5cdac9c1ffa0df7725395df4f4ee625b2acc1cb5f855bcca9be9960a63e57360387a06bbb1935ee45bb4318a729f68b6142b5b

  • SSDEEP

    196608:3M0TBvJYqN0upHcjyZ/xrcme8Ty9GCLLmu0f3rsZit:hNNBpHcezAmeR0PQZit

Malware Config

Targets

    • Target

      aumentar-memoria-ram-interna-copy-5-0-0.apk

    • Size

      7.3MB

    • MD5

      aa59f02b4e95ee3fdd00ae55978deb4e

    • SHA1

      3cd2fe989376cfe82a82ff6550586854c337d0b0

    • SHA256

      262d3b4fd3a1e21ea2092cf93109512f4b241ea3a6da1b32555a69636bcc3cdf

    • SHA512

      11566126fa01365eaf1cdef7bb5cdac9c1ffa0df7725395df4f4ee625b2acc1cb5f855bcca9be9960a63e57360387a06bbb1935ee45bb4318a729f68b6142b5b

    • SSDEEP

      196608:3M0TBvJYqN0upHcjyZ/xrcme8Ty9GCLLmu0f3rsZit:hNNBpHcezAmeR0PQZit

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks