General

  • Target

    bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135.apk

  • Size

    267KB

  • Sample

    241207-dsejhayqcr

  • MD5

    dd1c4e06c9d42eaab11b8345f9e3fbe9

  • SHA1

    f1824de3d19988e175117514d80a4a5eee89f114

  • SHA256

    bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135

  • SHA512

    d2c0e3ca6b341cdb2691b4f18593ba552f061870ad61774c136436a4de2cbde15a0e5ce7e2a2d8ada674f3af636522164bb0ea43474503bcfb8198ccef57d2f0

  • SSDEEP

    6144:VYHgOw673KBoeORPBAYsI7Nu5K6l3uttKXhaG0nSk+YbLvcFJGvNv90sh:VYJsoRnOIkgWqtKj0njDR9ph

Malware Config

Extracted

Family

ahmyth

C2

http://weeb.rocks:22222

Targets

    • Target

      bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135.apk

    • Size

      267KB

    • MD5

      dd1c4e06c9d42eaab11b8345f9e3fbe9

    • SHA1

      f1824de3d19988e175117514d80a4a5eee89f114

    • SHA256

      bce898587f683c70ea12b8612dd9dc1f791fa748e7c1f4584f4afb2009a1e135

    • SHA512

      d2c0e3ca6b341cdb2691b4f18593ba552f061870ad61774c136436a4de2cbde15a0e5ce7e2a2d8ada674f3af636522164bb0ea43474503bcfb8198ccef57d2f0

    • SSDEEP

      6144:VYHgOw673KBoeORPBAYsI7Nu5K6l3uttKXhaG0nSk+YbLvcFJGvNv90sh:VYJsoRnOIkgWqtKj0njDR9ph

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

MITRE ATT&CK Mobile v15

Tasks