General

  • Target

    91494ac3740da51f0715ef2c9d40d975c367ad4dd52d27cc0e8a0151571b0072.bin

  • Size

    1.2MB

  • Sample

    250328-13tgqssthv

  • MD5

    52118a9caf8c636aa12403c2a3375a0b

  • SHA1

    f479c915f44793d80e0ea5174692415f22db901f

  • SHA256

    91494ac3740da51f0715ef2c9d40d975c367ad4dd52d27cc0e8a0151571b0072

  • SHA512

    5c614cb5d69631900049c806c4c3fda7ebdf420dbe71e63d6d97f7b748f0f43e8da8202a96f4f9b18c0d60294c517748e435fbc04f0de354380bde2f62caa13e

  • SSDEEP

    24576:pFtCeaFt0AsrmaobBeWI67vT4m51+WtE0jI:pFtCQrEQWIxJWu0jI

Malware Config

Targets

    • Target

      91494ac3740da51f0715ef2c9d40d975c367ad4dd52d27cc0e8a0151571b0072.bin

    • Size

      1.2MB

    • MD5

      52118a9caf8c636aa12403c2a3375a0b

    • SHA1

      f479c915f44793d80e0ea5174692415f22db901f

    • SHA256

      91494ac3740da51f0715ef2c9d40d975c367ad4dd52d27cc0e8a0151571b0072

    • SHA512

      5c614cb5d69631900049c806c4c3fda7ebdf420dbe71e63d6d97f7b748f0f43e8da8202a96f4f9b18c0d60294c517748e435fbc04f0de354380bde2f62caa13e

    • SSDEEP

      24576:pFtCeaFt0AsrmaobBeWI67vT4m51+WtE0jI:pFtCQrEQWIxJWu0jI

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Mobile v15

Tasks