General

  • Target

    5d75e747ee6c22e97bb8b6583c613c89.bin

  • Size

    263KB

  • Sample

    241208-bqgjzavjdw

  • MD5

    15e7520897cee6e44ef60db2cd9c789e

  • SHA1

    b33112b3f74cb55ad9dc2f38c2a228f596d556a5

  • SHA256

    f14401a7900d0f1ea431c4046bdb39c3685ea4d909dd97b135c3f9ee919ad35a

  • SHA512

    2f87348ec6de86a8a8f235603b66ccaa193ed50780c1eb2c200294fd0f90fa87abc082d9240bf68ba4d376246a454afa2c905f2c674f9d84bf25a0921aeb9270

  • SSDEEP

    6144:SM98uJRTq4v6cXIr+oeI7YRfXIjJixAVDMxNV8rAKt/Rc7ENq2:dOShigIKfefjIhxcl/Rc7y/

Malware Config

Extracted

Family

ahmyth

C2

http://51.20.2.165:3001

Targets

    • Target

      057689e28c35811575811beaa1fa07bdc0130188f4590d286a564a0236060048.apk

    • Size

      267KB

    • MD5

      5d75e747ee6c22e97bb8b6583c613c89

    • SHA1

      e6dd14937e631b86fa9cf52e46c5b875a772a5ee

    • SHA256

      057689e28c35811575811beaa1fa07bdc0130188f4590d286a564a0236060048

    • SHA512

      00c5dff37a9a550d6149caa5e11cf89fee4970e16e8363d133f25f1b1f99443ffc54e36e8485dd93ef48481328efb35963112896f5d98400bd02b35e77573d66

    • SSDEEP

      6144:VAqOHJbQC/0BbaRWSoTlA87mhYrIZFjllLGvNv90ku:VAfJc4NUA8TI3llLo9A

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

MITRE ATT&CK Mobile v15

Tasks