General

  • Target

    Test_Virus-1.8.apk

  • Size

    1.7MB

  • Sample

    250510-g9a47aak3z

  • MD5

    dd227bf7c3fbfcc7030d146cbd6634a4

  • SHA1

    f582fced3159e3f6b1a561d3b5bd3dce4be69680

  • SHA256

    20d1ff18eda73e72e6ad20738c95c11843734169aedd495a01cf10c04c88a34a

  • SHA512

    17cb7c6d58afd769b780a085947a93d3a509b65ada07191957a5cb370e676c2b49e1bc162be7d36fa33087189c7c718c3169bd15f4b7777b43e60c30643d670b

  • SSDEEP

    49152:IwtxsShE2sRdHXlVWT1JCK1jIIGKXT3JS2z6/:IgqJd3bAvIIzdS2zK

Malware Config

Targets

    • Target

      Test_Virus-1.8.apk

    • Size

      1.7MB

    • MD5

      dd227bf7c3fbfcc7030d146cbd6634a4

    • SHA1

      f582fced3159e3f6b1a561d3b5bd3dce4be69680

    • SHA256

      20d1ff18eda73e72e6ad20738c95c11843734169aedd495a01cf10c04c88a34a

    • SHA512

      17cb7c6d58afd769b780a085947a93d3a509b65ada07191957a5cb370e676c2b49e1bc162be7d36fa33087189c7c718c3169bd15f4b7777b43e60c30643d670b

    • SSDEEP

      49152:IwtxsShE2sRdHXlVWT1JCK1jIIGKXT3JS2z6/:IgqJd3bAvIIzdS2zK

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v16

Tasks