General

  • Target

    2aec43a86c635cae0ec5f4bd2e216eba61da36b65068a86da324224627193bce.apk

  • Size

    267KB

  • Sample

    241207-cr474awpdk

  • MD5

    cf1832b4243205d3b3bca133d2129f7e

  • SHA1

    7ce6f37d41ae1a6282cac0e285da75a2a2c4871f

  • SHA256

    2aec43a86c635cae0ec5f4bd2e216eba61da36b65068a86da324224627193bce

  • SHA512

    c3c3eabf2a59f950f3638e3360b6de2e2071261a553daedacbe74a16bb887c0f71005872338c79318c30facf0ba975aaf3c3f44d5d1bfd6f42e0551b44e83c57

  • SSDEEP

    6144:UEow1GGGTBC22Lri4EvAj0pl30q4RMdBsMYW3N/90W:UEow1NaIbJjg0fQBs3Q9B

Malware Config

Extracted

Family

ahmyth

C2

http://127.0.0.1:22222

Targets

    • Target

      2aec43a86c635cae0ec5f4bd2e216eba61da36b65068a86da324224627193bce.apk

    • Size

      267KB

    • MD5

      cf1832b4243205d3b3bca133d2129f7e

    • SHA1

      7ce6f37d41ae1a6282cac0e285da75a2a2c4871f

    • SHA256

      2aec43a86c635cae0ec5f4bd2e216eba61da36b65068a86da324224627193bce

    • SHA512

      c3c3eabf2a59f950f3638e3360b6de2e2071261a553daedacbe74a16bb887c0f71005872338c79318c30facf0ba975aaf3c3f44d5d1bfd6f42e0551b44e83c57

    • SSDEEP

      6144:UEow1GGGTBC22Lri4EvAj0pl30q4RMdBsMYW3N/90W:UEow1NaIbJjg0fQBs3Q9B

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

MITRE ATT&CK Mobile v15

Tasks