General

  • Target

    62b6cbd4eecd31b9ffabc97c114457479637f3129353f87bc13d14427a438bf7.bin

  • Size

    4.6MB

  • Sample

    241114-1ywfjatfqg

  • MD5

    ff13c5b619dd81ddc756bccbd67a4421

  • SHA1

    0ec02ef231be5ea684d46c68b1ca912aec39318c

  • SHA256

    62b6cbd4eecd31b9ffabc97c114457479637f3129353f87bc13d14427a438bf7

  • SHA512

    ca2a45df8e9c02e9112df22358073726052e12820801139c7d7901ea21da76793715f51d9d6e298a72d99fe387bb6379845fbf1b84bc661588467c77b59abb67

  • SSDEEP

    98304:62V1tK83WRq05qdwOXalOV8Q0ocOVl+daO8qwGbPlG:lfvW80Id7a2hnMQO8qwGU

Malware Config

Targets

    • Target

      62b6cbd4eecd31b9ffabc97c114457479637f3129353f87bc13d14427a438bf7.bin

    • Size

      4.6MB

    • MD5

      ff13c5b619dd81ddc756bccbd67a4421

    • SHA1

      0ec02ef231be5ea684d46c68b1ca912aec39318c

    • SHA256

      62b6cbd4eecd31b9ffabc97c114457479637f3129353f87bc13d14427a438bf7

    • SHA512

      ca2a45df8e9c02e9112df22358073726052e12820801139c7d7901ea21da76793715f51d9d6e298a72d99fe387bb6379845fbf1b84bc661588467c77b59abb67

    • SSDEEP

      98304:62V1tK83WRq05qdwOXalOV8Q0ocOVl+daO8qwGbPlG:lfvW80Id7a2hnMQO8qwGU

    • A potential corporate email address has been identified in the URL: [email protected]

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks