General

  • Target

    tpa.apk

  • Size

    11.4MB

  • Sample

    250328-vybs8syyex

  • MD5

    f298aaadbd4176baaa62ab84f8268685

  • SHA1

    55c04a5a2f5937ac58c8627186f69d2d237bafe0

  • SHA256

    5c8c709cf8902859edf69ff3999a13277668869fcd5efe020e1e520a2d099623

  • SHA512

    2729a2aa057dbf9792139faed30bb2ec0d9749c2606c59b181ec28f9e524c3acb74b364a521f1cb169a0cacda6fa7dec6618215a673d36cdc4b492e1d9b5cadd

  • SSDEEP

    196608:b4WDPHQgvI4N8DDtoQtm3O2PgZPD9VlvOcggldJb9eXKHpc7m5WfBQq65w:b4+HQgvbOtoQtxy4b9vOGjJb9Q7Yq6u

Malware Config

Targets

    • Target

      tpa.apk

    • Size

      11.4MB

    • MD5

      f298aaadbd4176baaa62ab84f8268685

    • SHA1

      55c04a5a2f5937ac58c8627186f69d2d237bafe0

    • SHA256

      5c8c709cf8902859edf69ff3999a13277668869fcd5efe020e1e520a2d099623

    • SHA512

      2729a2aa057dbf9792139faed30bb2ec0d9749c2606c59b181ec28f9e524c3acb74b364a521f1cb169a0cacda6fa7dec6618215a673d36cdc4b492e1d9b5cadd

    • SSDEEP

      196608:b4WDPHQgvI4N8DDtoQtm3O2PgZPD9VlvOcggldJb9eXKHpc7m5WfBQq65w:b4+HQgvbOtoQtxy4b9vOGjJb9Q7Yq6u

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

MITRE ATT&CK Mobile v15

Tasks