General

  • Target

    988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.bin

  • Size

    3.9MB

  • Sample

    250328-12t2wastf1

  • MD5

    7c8b3c00973ca3958f4e41e8950cce35

  • SHA1

    824a227d09917582c8ecf5594b62454931fdba22

  • SHA256

    988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a

  • SHA512

    73b980b63bbdb97388cff1220deecfb507d903cda89ed3cde99a3f0a3dab67f49e43ae5ccb16642d0c33dc7eef99ddbd3f150f173b8cc9a1acbc7105b363a13b

  • SSDEEP

    98304:2fZi2qb/g2nKAPQthA8Cm0IkxOLN9g2/Lo2PZtceey:s4h4j2l8SYY9E

Malware Config

Targets

    • Target

      988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a.bin

    • Size

      3.9MB

    • MD5

      7c8b3c00973ca3958f4e41e8950cce35

    • SHA1

      824a227d09917582c8ecf5594b62454931fdba22

    • SHA256

      988b57dbef854f64c336421be4ff779ae07bc3a184cefc2432f98966f862579a

    • SHA512

      73b980b63bbdb97388cff1220deecfb507d903cda89ed3cde99a3f0a3dab67f49e43ae5ccb16642d0c33dc7eef99ddbd3f150f173b8cc9a1acbc7105b363a13b

    • SSDEEP

      98304:2fZi2qb/g2nKAPQthA8Cm0IkxOLN9g2/Lo2PZtceey:s4h4j2l8SYY9E

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks