General

  • Target

    app-release.apk

  • Size

    30.7MB

  • Sample

    250328-s5w2msxzfz

  • MD5

    8a890bc1243580758bd4f9ed4d818fe4

  • SHA1

    a1a86fc76ef9f0656d88642fdcfbbaa02b673a55

  • SHA256

    b2b59e5a765e763f196efea2c094698f5209faf8d6f614c66c36719990d28afb

  • SHA512

    9d012e33154f99ec1ca258684d91968225ff1c09fe5500647965c99095b740540d3822dee6ef82c3e6607c51caa45354b7f95d0f868a0fdcc7976cbe8ec13030

  • SSDEEP

    786432:iceiAME8+W58VrF/ABtAPr+HJde+tRLEZM+lmDfD2sTgkNGmiXwc7Fk:iBzM9tsYBa8JdZRLEZM+lVnmihFk

Malware Config

Targets

    • Target

      app-release.apk

    • Size

      30.7MB

    • MD5

      8a890bc1243580758bd4f9ed4d818fe4

    • SHA1

      a1a86fc76ef9f0656d88642fdcfbbaa02b673a55

    • SHA256

      b2b59e5a765e763f196efea2c094698f5209faf8d6f614c66c36719990d28afb

    • SHA512

      9d012e33154f99ec1ca258684d91968225ff1c09fe5500647965c99095b740540d3822dee6ef82c3e6607c51caa45354b7f95d0f868a0fdcc7976cbe8ec13030

    • SSDEEP

      786432:iceiAME8+W58VrF/ABtAPr+HJde+tRLEZM+lmDfD2sTgkNGmiXwc7Fk:iBzM9tsYBa8JdZRLEZM+lVnmihFk

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks