General

  • Target

    c4cca5b7ca5ca8d2ec3609597195936e9e8e30710c8a746e0a2e3b53b31181fd.bin

  • Size

    3.4MB

  • Sample

    250116-123c9aslbp

  • MD5

    b364b574682e4388454ca63ecb219fcd

  • SHA1

    4cc3e842f8242d89bd3b08c6abe7559c85306a79

  • SHA256

    c4cca5b7ca5ca8d2ec3609597195936e9e8e30710c8a746e0a2e3b53b31181fd

  • SHA512

    eb0f58b89e613a4c8922944c9e52dceefc69bcd65657ed9bdb61ae424b94b5b7a3c5fa49914d0d18ce85e1dad112c8e5a4c2b450d5fb19d0ccc5bb5a110bf567

  • SSDEEP

    49152:WnszHYdN6agL1emglGlKb8pjADuf82wc1V4MVuQ6IP/KrAEend:EszHY52dgl+L8P8V4nQP/KrAEend

Malware Config

Targets

    • Target

      c4cca5b7ca5ca8d2ec3609597195936e9e8e30710c8a746e0a2e3b53b31181fd.bin

    • Size

      3.4MB

    • MD5

      b364b574682e4388454ca63ecb219fcd

    • SHA1

      4cc3e842f8242d89bd3b08c6abe7559c85306a79

    • SHA256

      c4cca5b7ca5ca8d2ec3609597195936e9e8e30710c8a746e0a2e3b53b31181fd

    • SHA512

      eb0f58b89e613a4c8922944c9e52dceefc69bcd65657ed9bdb61ae424b94b5b7a3c5fa49914d0d18ce85e1dad112c8e5a4c2b450d5fb19d0ccc5bb5a110bf567

    • SSDEEP

      49152:WnszHYdN6agL1emglGlKb8pjADuf82wc1V4MVuQ6IP/KrAEend:EszHY52dgl+L8P8V4nQP/KrAEend

    • Checks Android system properties for emulator presence.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks