General

  • Target

    22630ed5c6d5c395bb65579f23bb2de24572e7eaa99d15a1c0919fe1d15f369a.zip

  • Size

    2.7MB

  • Sample

    250325-py5hnazly7

  • MD5

    54cf794b40ba43f673d7ea0c92387874

  • SHA1

    653825b23e5107e88a215180c6aa7a6fdeaed14f

  • SHA256

    22630ed5c6d5c395bb65579f23bb2de24572e7eaa99d15a1c0919fe1d15f369a

  • SHA512

    3c99ef3e069bb411da85ef28982d01642c15c04a66a55bf46cf6914219deb5f75e503f94058cf4b5665d631e0738a4ecb59bb2a00b68d09ea4f3ac0b0dbd84aa

  • SSDEEP

    49152:g7GkyND2ZQjZ4HYa4OupQptWIcDQlG5MuM71HlL6v7J9isNKFw5l2v39qZL:ev02ZQjZ4hApqt5tuA1FL6DJ2c69qZL

Malware Config

Targets

    • Target

      9f2d916b1e0ee486f5a49e3e9887eae59dbdca0a554139ae9a4dc8edc2f12de0.apk

    • Size

      2.8MB

    • MD5

      af9fde69078e906d628f5c04fe4ab11f

    • SHA1

      6607baef8a3f4d0a077b8d38eea4afab4b8e9c5f

    • SHA256

      9f2d916b1e0ee486f5a49e3e9887eae59dbdca0a554139ae9a4dc8edc2f12de0

    • SHA512

      2a43ef73873d24254bd49a1b7b5e04ec279aabe06076bbec44d3c2ce867e619136aca9b85e319d6c6c0c0ed29b3331ccbe091549cc33a13d232ecf338bf42fef

    • SSDEEP

      49152:CdB2WK9IVhZGa7+o4Dmu1iAYOSMA+418rU4+xVRgOd35UZJlTn7C:CdIxWVhZGaCoCiTrU46UPhlO9TG

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks