General

  • Target

    4f309b057a0465bfa98eeff9c39dcfb2.apk

  • Size

    3.3MB

  • Sample

    240701-krshaswaqj

  • MD5

    4f309b057a0465bfa98eeff9c39dcfb2

  • SHA1

    4d8de118f8db6ba1fcd91aa250c7c6093ffce703

  • SHA256

    a3a36a2884e086145608b737c1d9c66798dc14983cad47203fe1fbdffbc33a71

  • SHA512

    50400988c473b155b6789a394cf9018bed8fcd7a9cfbc879fa65321fab27429bfc7568b2f4fde55ee335f9e844bf9cdba05aaff3542ac59faec08c45c242c152

  • SSDEEP

    98304:JTf6kkRqA2R0aAqzkkIOX5BaB06AcWfGzp0gWC:565RtWd/5M+69us

Malware Config

Targets

    • Target

      4f309b057a0465bfa98eeff9c39dcfb2.apk

    • Size

      3.3MB

    • MD5

      4f309b057a0465bfa98eeff9c39dcfb2

    • SHA1

      4d8de118f8db6ba1fcd91aa250c7c6093ffce703

    • SHA256

      a3a36a2884e086145608b737c1d9c66798dc14983cad47203fe1fbdffbc33a71

    • SHA512

      50400988c473b155b6789a394cf9018bed8fcd7a9cfbc879fa65321fab27429bfc7568b2f4fde55ee335f9e844bf9cdba05aaff3542ac59faec08c45c242c152

    • SSDEEP

      98304:JTf6kkRqA2R0aAqzkkIOX5BaB06AcWfGzp0gWC:565RtWd/5M+69us

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks