General

  • Target

    e718e9b1cf8c5f81f485022e44a8178ebf3aed62

  • Size

    1.5MB

  • Sample

    250211-r3125swqfq

  • MD5

    80cd72c756b488b057157483bf4c89d3

  • SHA1

    e718e9b1cf8c5f81f485022e44a8178ebf3aed62

  • SHA256

    b4ed7eae643cea6f4087cd5b7187675cfe252d0f638657496458fc38b99d70cb

  • SHA512

    22c97fb8b4894b7dc5668f4c2077704f516247eaf41a515af4f453643734d26231ddc07fa993da458fe6913c18025b9b69bbc13158b95681c9349edf9dc69b3e

  • SSDEEP

    49152:HFCp6BL43YiKL/GtQnqahUaTcjLsV0tfRfVd+vdu:AWLNqCBTGU0B7Cdu

Malware Config

Targets

    • Target

      e718e9b1cf8c5f81f485022e44a8178ebf3aed62

    • Size

      1.5MB

    • MD5

      80cd72c756b488b057157483bf4c89d3

    • SHA1

      e718e9b1cf8c5f81f485022e44a8178ebf3aed62

    • SHA256

      b4ed7eae643cea6f4087cd5b7187675cfe252d0f638657496458fc38b99d70cb

    • SHA512

      22c97fb8b4894b7dc5668f4c2077704f516247eaf41a515af4f453643734d26231ddc07fa993da458fe6913c18025b9b69bbc13158b95681c9349edf9dc69b3e

    • SSDEEP

      49152:HFCp6BL43YiKL/GtQnqahUaTcjLsV0tfRfVd+vdu:AWLNqCBTGU0B7Cdu

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks