General

  • Target

    https://www.mediafire.com/file/v850yea7gvsk4p3/GDPSO_1.0.apk/file?dkey=uce6d1zwwtt&r=1019

  • Sample

    241220-3shctsxjf1

Malware Config

Targets

    • Target

      https://www.mediafire.com/file/v850yea7gvsk4p3/GDPSO_1.0.apk/file?dkey=uce6d1zwwtt&r=1019

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: currency-file@1

    • Executes dropped EXE

    • Loads dropped DLL

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Detected potential entity reuse from brand STEAM.

MITRE ATT&CK Enterprise v15

Tasks