General

  • Target

    db44a4ae419c639b5df217a0409d166ab2cd30b5285577815c5cb9f4fdca4704.bin

  • Size

    3.2MB

  • Sample

    250328-1ygblstnx9

  • MD5

    bad2ce50e2b1f3b021d3c9c26f0c6fac

  • SHA1

    0d219dab5fe997d48d122741ea8795226c185715

  • SHA256

    db44a4ae419c639b5df217a0409d166ab2cd30b5285577815c5cb9f4fdca4704

  • SHA512

    003a0e8e398572b7fea4125f0ee2a05f33710b1d55ffc4a496f379659905486b8414ed5586edf83f052cb6162284633d257572601e8f3c4a429b9c4152f8d581

  • SSDEEP

    98304:zvfWauQvPPsowBF7LLuDv+TMGyKoJX+QMDH82C4mbgjFfyaO:zGauQv2XiDAShv

Malware Config

Targets

    • Target

      db44a4ae419c639b5df217a0409d166ab2cd30b5285577815c5cb9f4fdca4704.bin

    • Size

      3.2MB

    • MD5

      bad2ce50e2b1f3b021d3c9c26f0c6fac

    • SHA1

      0d219dab5fe997d48d122741ea8795226c185715

    • SHA256

      db44a4ae419c639b5df217a0409d166ab2cd30b5285577815c5cb9f4fdca4704

    • SHA512

      003a0e8e398572b7fea4125f0ee2a05f33710b1d55ffc4a496f379659905486b8414ed5586edf83f052cb6162284633d257572601e8f3c4a429b9c4152f8d581

    • SSDEEP

      98304:zvfWauQvPPsowBF7LLuDv+TMGyKoJX+QMDH82C4mbgjFfyaO:zGauQv2XiDAShv

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks