General
-
Target
51173cdd9ce8880c985a8104a9ed64fa15b5c7ab70ea709af083bc92d575f913.bin
-
Size
4.9MB
-
Sample
250225-129sbszpv6
-
MD5
cd92e893e4fc5aee975daed0fd8e7b7a
-
SHA1
ef1c4ca3871e8ca457fec02b5d43be3d370f0d33
-
SHA256
51173cdd9ce8880c985a8104a9ed64fa15b5c7ab70ea709af083bc92d575f913
-
SHA512
bb16e86f2b27492296681cdef7ea32f306475c6dd20425a7d1cda90c188b274d57067a4da939dabd8706847196194531899eeea9d7453b422aa7bfa055dddc02
-
SSDEEP
98304:cyYQc8ij4VDOS6VyZkxFwD0TD0yD0OD0eRD0nAUD0EiD07bD04uV:cV5PjvSlcwDeDrDZDPDCBD8DYbDBuV
Behavioral task
behavioral1
Sample
51173cdd9ce8880c985a8104a9ed64fa15b5c7ab70ea709af083bc92d575f913.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
51173cdd9ce8880c985a8104a9ed64fa15b5c7ab70ea709af083bc92d575f913.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
51173cdd9ce8880c985a8104a9ed64fa15b5c7ab70ea709af083bc92d575f913.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
51173cdd9ce8880c985a8104a9ed64fa15b5c7ab70ea709af083bc92d575f913.bin
-
Size
4.9MB
-
MD5
cd92e893e4fc5aee975daed0fd8e7b7a
-
SHA1
ef1c4ca3871e8ca457fec02b5d43be3d370f0d33
-
SHA256
51173cdd9ce8880c985a8104a9ed64fa15b5c7ab70ea709af083bc92d575f913
-
SHA512
bb16e86f2b27492296681cdef7ea32f306475c6dd20425a7d1cda90c188b274d57067a4da939dabd8706847196194531899eeea9d7453b422aa7bfa055dddc02
-
SSDEEP
98304:cyYQc8ij4VDOS6VyZkxFwD0TD0yD0OD0eRD0nAUD0EiD07bD04uV:cV5PjvSlcwDeDrDZDPDCBD8DYbDBuV
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1