General

  • Target

    e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775.bin

  • Size

    2.5MB

  • Sample

    240630-12x4jazhln

  • MD5

    c50db87c26a020410ac4ee35bef6ae68

  • SHA1

    00d31e21aa8b1b65f80e464ed01567ce0528bf6c

  • SHA256

    e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775

  • SHA512

    1866d019b17fb302ad083e8e1d54c6dc88956b96907b7326089f914e388fb4c3fcbab22ca058bd9f29d8b8f14d93a6faf9375618858d9a4fc3a49563872b1c50

  • SSDEEP

    49152:MoGIErz29ASurd17S+mWuZYxlFHyJVQ2QbpzcqvganpqMIoTwrswYFpv:UIU2+SurjjugHbvOiwoTwrswY7

Malware Config

Targets

    • Target

      e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775.bin

    • Size

      2.5MB

    • MD5

      c50db87c26a020410ac4ee35bef6ae68

    • SHA1

      00d31e21aa8b1b65f80e464ed01567ce0528bf6c

    • SHA256

      e38a6c567605027ce14810313cbfd363b9baa53d554e58d84fd7d936b2f53775

    • SHA512

      1866d019b17fb302ad083e8e1d54c6dc88956b96907b7326089f914e388fb4c3fcbab22ca058bd9f29d8b8f14d93a6faf9375618858d9a4fc3a49563872b1c50

    • SSDEEP

      49152:MoGIErz29ASurd17S+mWuZYxlFHyJVQ2QbpzcqvganpqMIoTwrswYFpv:UIU2+SurjjugHbvOiwoTwrswY7

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks