General

  • Target

    version3.2.apk

  • Size

    3.6MB

  • Sample

    241215-vqly8szrew

  • MD5

    86b9be3dfc022d5b4725756c0cc5a02b

  • SHA1

    e899c25a2674f317b8327682553ecf6a9f436f94

  • SHA256

    4e609c2edadf166dbcb5c492e48d8169d5a36b09a3698a1ef27cd681e9f36f1b

  • SHA512

    ae5798ec1e65fa91adcd73d6f6dde480e1180725e1b6c60aa4c4d1e10e2aefd890988d5f93ea3fb49c689d67d024dbf95df0ca20f8547b70662b7a063b96aab1

  • SSDEEP

    98304:oK4MrIdrbxVoPs14H9xx6eDo6ddgwLOKTQdGd:oK4MrIdrbPoEwv0I7IGd

Malware Config

Targets

    • Target

      version3.2.apk

    • Size

      3.6MB

    • MD5

      86b9be3dfc022d5b4725756c0cc5a02b

    • SHA1

      e899c25a2674f317b8327682553ecf6a9f436f94

    • SHA256

      4e609c2edadf166dbcb5c492e48d8169d5a36b09a3698a1ef27cd681e9f36f1b

    • SHA512

      ae5798ec1e65fa91adcd73d6f6dde480e1180725e1b6c60aa4c4d1e10e2aefd890988d5f93ea3fb49c689d67d024dbf95df0ca20f8547b70662b7a063b96aab1

    • SSDEEP

      98304:oK4MrIdrbxVoPs14H9xx6eDo6ddgwLOKTQdGd:oK4MrIdrbPoEwv0I7IGd

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks