General
-
Target
Update_130.1.6723.108.apk
-
Size
8.6MB
-
Sample
250204-rsl58szqck
-
MD5
591bd3375176c120e46620897117230f
-
SHA1
17bb2aed71ce0f1bba8d1d288c695d2b2266b016
-
SHA256
14a0995d3a1008d8027a90a2696ef4452225c0411693b4e82e45cd50b1781cda
-
SHA512
bb4dca37d6eca6282be01a79a073f9d06f4602397a07459efae6d8583daac549e7b74772ce279edbc483451c86741ffb8e168e81378dcc28adc6a931edfd1cc0
-
SSDEEP
196608:kMJlMUPUPu0H2v8LBhGrmJmn8ihzrfcJsyu5tW587NB5F2qwWbIm+KaeTx:EUPUmqc8lMiJmn8ihz6/u5tlvbqfu
Static task
static1
Behavioral task
behavioral1
Sample
Update_130.1.6723.108.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Update_130.1.6723.108.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Update_130.1.6723.108.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
jidofe.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
jidofe.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
jidofe.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
Update_130.1.6723.108.apk
-
Size
8.6MB
-
MD5
591bd3375176c120e46620897117230f
-
SHA1
17bb2aed71ce0f1bba8d1d288c695d2b2266b016
-
SHA256
14a0995d3a1008d8027a90a2696ef4452225c0411693b4e82e45cd50b1781cda
-
SHA512
bb4dca37d6eca6282be01a79a073f9d06f4602397a07459efae6d8583daac549e7b74772ce279edbc483451c86741ffb8e168e81378dcc28adc6a931edfd1cc0
-
SSDEEP
196608:kMJlMUPUPu0H2v8LBhGrmJmn8ihzrfcJsyu5tW587NB5F2qwWbIm+KaeTx:EUPUmqc8lMiJmn8ihz6/u5tlvbqfu
-
Antidot family
-
Antidot payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks the application is allowed to request package installs through the package installer
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
-
Queries the mobile country code (MCC)
-
Requests allowing to install additional applications from unknown sources.
-
-
-
Target
jidofe
-
Size
9.3MB
-
MD5
bb52b4b78af8fb0d90cd8cbbe64b51b4
-
SHA1
3647b7df4ca5de696a455ef768b65d1af0b2a5d4
-
SHA256
a8fb72748e0f1ed547d0d63991b8a46c254ca644bf5caf88eba680b1f0b23b50
-
SHA512
ccc5756e7c95c0485745be5d1eb484a171b983a7984dc7d77e40e4d730ff5ebc375649a9f2970d7a809c9929820428b2400b1d8b03eefd52e753dee009eb05ef
-
SSDEEP
196608:s6OnhxCYN6Dv93pJiTj4Nv3gyeYeMNeUhC:axN6Dv9BNfC
-
Antidot family
-
Antidot payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Requests uninstalling the application.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1