General
-
Target
Update.zip
-
Size
11.6MB
-
Sample
250404-llk2pstyay
-
MD5
1e996cfb7d6ea0cf04ff3a6a51a74b41
-
SHA1
f10e7fa0963092bc8158af4a022c281cf161e5ea
-
SHA256
b039eb4e742a77a99452781f9de0aafd51bcfad6dcfea745e88200d0dd1ab69a
-
SHA512
a8c6a56ee80a2e8e5dc73cbeb1418430133039dc5a385c8388fea2669b7e1879be40981c896f46b52d8961c3da4ea1201d0956e9ecac0f52a8f147362cf4dce5
-
SSDEEP
196608:MaCJuUOsY23cRw0EN2jXhdlnF9+m0h96de9iYZJl2qMoE/eQi7wA7jy:MLPOsYQkwDN2jX1nFYvsMJZT2JoELFC2
Static task
static1
Behavioral task
behavioral1
Sample
Update.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
Update.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
Update.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
vibufagafa.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
vibufagafa.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
vibufagafa.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
Update.apk
-
Size
17.1MB
-
MD5
d44caa02e4fa7e2992b327abb4242791
-
SHA1
2ec56ee9ad5fe44a3407ff977c6d0b5dfe4704e6
-
SHA256
3de709dadce6084258b4928145e5da404affeeedad19426f93a2741d6fd6dcf4
-
SHA512
46b0c1d1a118bbfe621a1f95d2186259db9f3d458adbfdd07686961559d88b37252b1d71fdd4d9aad6e6f6e2b120c906fd52dc04612ae6e1de17fe9d356af57a
-
SSDEEP
393216:n/6/FU/4HPKDDeXtn7rqqn8W41YRdcz27+rDrfn7S3Zd:n/6924yDiXZr18W41YRvwDrfmZd
-
Antidot family
-
Antidot payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks the application is allowed to request package installs through the package installer
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
-
Queries the mobile country code (MCC)
-
-
-
Target
vibufagafa
-
Size
9.9MB
-
MD5
6f6aa0edc0e3e93700384a88a519aee2
-
SHA1
6dbf7f2185e3bc368f07a9009f9322f2e85c3181
-
SHA256
54819e64834851d97c6dfd6c48e4c2b65d5bded096eef41ebb4eb478f082842f
-
SHA512
20377ebedeaf463fdb9b4aae4d8b9e230fbbce0707d52491436e0f8a2955087e73f7b1190197c84b3e31c6bdd559c018f5755315f55e89a8e1c3820e65457bed
-
SSDEEP
196608:4ctSV521/8flAkCaqtrdDDeXtUu7rqLen1GxW89oY1Y4:0U/4HPKDDeXtn7rqqn8W41Y4
-
Antidot family
-
Antidot payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Requests uninstalling the application.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1