General

  • Target

    e20bf76b287d2fc36bb8358ad9bc9289d19ddfa6ae5ad985403e99081c787a18.bin

  • Size

    102KB

  • Sample

    250116-12zblaslbm

  • MD5

    a96fdeebde069a42a51a44d734b0eee7

  • SHA1

    355b8894773fd9966ae5ccc9b9f33160802bb93c

  • SHA256

    e20bf76b287d2fc36bb8358ad9bc9289d19ddfa6ae5ad985403e99081c787a18

  • SHA512

    46eb16e58701767c6f7dd6ff919eedbb3a9b4b4e8fc4fa5445b503258c750d01161fdf39a81a495c1f526ba3889209b6c2ca0f696a1e2e9168e3ced8e9cab90a

  • SSDEEP

    3072:A8EcttGIEZvMI+p/F8l6IO3f8ZbwcYklkG+:A8EyGIAR+pt8l613kZbwcYNG+

Malware Config

Targets

    • Target

      e20bf76b287d2fc36bb8358ad9bc9289d19ddfa6ae5ad985403e99081c787a18.bin

    • Size

      102KB

    • MD5

      a96fdeebde069a42a51a44d734b0eee7

    • SHA1

      355b8894773fd9966ae5ccc9b9f33160802bb93c

    • SHA256

      e20bf76b287d2fc36bb8358ad9bc9289d19ddfa6ae5ad985403e99081c787a18

    • SHA512

      46eb16e58701767c6f7dd6ff919eedbb3a9b4b4e8fc4fa5445b503258c750d01161fdf39a81a495c1f526ba3889209b6c2ca0f696a1e2e9168e3ced8e9cab90a

    • SSDEEP

      3072:A8EcttGIEZvMI+p/F8l6IO3f8ZbwcYklkG+:A8EyGIAR+pt8l613kZbwcYNG+

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks