General

  • Target

    Android_Faker_v1.8.4_Premiumuserupload.in.apk

  • Size

    25.9MB

  • Sample

    241206-b26y1ayrcq

  • MD5

    5dd71755429d9dd6646ee944a7a9b5d9

  • SHA1

    86b0a23ca124864ca6673ad443c445da127df47f

  • SHA256

    61d6ad05c887bd0027ea828098ccb799ab7b8b108b3285a2338274659dc3c13a

  • SHA512

    d6c67a0cc2dd66393f1a983e2fe00a8341df30d322c87051aa788b403325e9642515695bc4b8cc49381467686d2fe88b320ab8f44950471a65392ceade6f5d58

  • SSDEEP

    393216:N+O/TGb4pwKPCHp/KxTllHJq5vSio3fkl9yfZyICfkYI6L+uq:IITiqDPCJ/ETlu5ZQRlT

Malware Config

Targets

    • Target

      Android_Faker_v1.8.4_Premiumuserupload.in.apk

    • Size

      25.9MB

    • MD5

      5dd71755429d9dd6646ee944a7a9b5d9

    • SHA1

      86b0a23ca124864ca6673ad443c445da127df47f

    • SHA256

      61d6ad05c887bd0027ea828098ccb799ab7b8b108b3285a2338274659dc3c13a

    • SHA512

      d6c67a0cc2dd66393f1a983e2fe00a8341df30d322c87051aa788b403325e9642515695bc4b8cc49381467686d2fe88b320ab8f44950471a65392ceade6f5d58

    • SSDEEP

      393216:N+O/TGb4pwKPCHp/KxTllHJq5vSio3fkl9yfZyICfkYI6L+uq:IITiqDPCJ/ETlu5ZQRlT

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks