General

  • Target

    4da3dad20d1e877c77885935039f7cf634e6368cdd511759e1d04ce0300bad87.bin

  • Size

    4.0MB

  • Sample

    240630-1yjrqszgll

  • MD5

    90507f7715bc0139e2e9584654fc1b73

  • SHA1

    b8c8e9baff187d2cf93ba41c4a91d4e77784a33f

  • SHA256

    4da3dad20d1e877c77885935039f7cf634e6368cdd511759e1d04ce0300bad87

  • SHA512

    0eb2373256f58ddc1b5a699c4e602b2478625ae287524c882e4b4a8d8f6b6facdf6435bf37e600cdfcf6eaf91f352f36e987171836d60b26ce383dd5ec12041b

  • SSDEEP

    98304:e0LmPMYeft07aSH4C6wn2Q/kGuYnoCfc+Y:eHX7aSHDP1NnK

Malware Config

Targets

    • Target

      4da3dad20d1e877c77885935039f7cf634e6368cdd511759e1d04ce0300bad87.bin

    • Size

      4.0MB

    • MD5

      90507f7715bc0139e2e9584654fc1b73

    • SHA1

      b8c8e9baff187d2cf93ba41c4a91d4e77784a33f

    • SHA256

      4da3dad20d1e877c77885935039f7cf634e6368cdd511759e1d04ce0300bad87

    • SHA512

      0eb2373256f58ddc1b5a699c4e602b2478625ae287524c882e4b4a8d8f6b6facdf6435bf37e600cdfcf6eaf91f352f36e987171836d60b26ce383dd5ec12041b

    • SSDEEP

      98304:e0LmPMYeft07aSH4C6wn2Q/kGuYnoCfc+Y:eHX7aSHDP1NnK

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks