General

  • Target

    TASK-MANAGER.apk

  • Size

    256KB

  • Sample

    250117-a6awpawpez

  • MD5

    aff6bce844a656890e3a647a8871c479

  • SHA1

    070c319ac871d9bd63a6af562bd8e5b237e01acf

  • SHA256

    ab5d91a02f508e5e0e9567e1558ce1e006c0e30a6b432bef72842a1adebffbff

  • SHA512

    c7e7b41fc9bcda5fb1c4741bc7ece6d6714265e06b3835a2c307a1a1d279ba109f91d762008fb672f3a90e78cac121163424569f8d6f08f20dcecc0d2f5e59c8

  • SSDEEP

    6144:vie8HiRem77eyFBPxoLZ7ILWFDPLnQ/9UNPIDdjQXvhuN5DuUuF:vi7HiRh6CoV08nI9UNADlQ/h6aBF

Malware Config

Extracted

Family

ahmyth

C2

http://10.20.30.40:4488

Targets

    • Target

      TASK-MANAGER.apk

    • Size

      256KB

    • MD5

      aff6bce844a656890e3a647a8871c479

    • SHA1

      070c319ac871d9bd63a6af562bd8e5b237e01acf

    • SHA256

      ab5d91a02f508e5e0e9567e1558ce1e006c0e30a6b432bef72842a1adebffbff

    • SHA512

      c7e7b41fc9bcda5fb1c4741bc7ece6d6714265e06b3835a2c307a1a1d279ba109f91d762008fb672f3a90e78cac121163424569f8d6f08f20dcecc0d2f5e59c8

    • SSDEEP

      6144:vie8HiRem77eyFBPxoLZ7ILWFDPLnQ/9UNPIDdjQXvhuN5DuUuF:vi7HiRh6CoV08nI9UNADlQ/h6aBF

    • Removes its main activity from the application launcher

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

MITRE ATT&CK Mobile v15

Tasks