General

  • Target

    960a508a362cd881f91182409f39643e2a923dd2b676227e690bb34b1985635a.apk

  • Size

    18.2MB

  • Sample

    240704-1kvl3ssgrh

  • MD5

    96bcabddc4b8aee36563676d8e87357a

  • SHA1

    c08fdeabc6238f68b74ca838ef6885ecdbcb1da5

  • SHA256

    960a508a362cd881f91182409f39643e2a923dd2b676227e690bb34b1985635a

  • SHA512

    85a404e40e7dd1070eca062d5af69ff291e14eb736fd5949d392604fb36b763a9e860452bcf9a69b5f240e1195daec61aa9b4e796bf3f6fee2a918c0ef2c5ee3

  • SSDEEP

    393216:e6KxmU1H18e6zq8Abu5k+g1GH44oSdtTg3upwgURXXgdutRWKr0zWo6Y6mS7M:fKBk0buGHq4petTVzURXXRRWKbSl

Malware Config

Targets

    • Target

      960a508a362cd881f91182409f39643e2a923dd2b676227e690bb34b1985635a.apk

    • Size

      18.2MB

    • MD5

      96bcabddc4b8aee36563676d8e87357a

    • SHA1

      c08fdeabc6238f68b74ca838ef6885ecdbcb1da5

    • SHA256

      960a508a362cd881f91182409f39643e2a923dd2b676227e690bb34b1985635a

    • SHA512

      85a404e40e7dd1070eca062d5af69ff291e14eb736fd5949d392604fb36b763a9e860452bcf9a69b5f240e1195daec61aa9b4e796bf3f6fee2a918c0ef2c5ee3

    • SSDEEP

      393216:e6KxmU1H18e6zq8Abu5k+g1GH44oSdtTg3upwgURXXgdutRWKr0zWo6Y6mS7M:fKBk0buGHq4petTVzURXXRRWKbSl

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Queries information about active data network

MITRE ATT&CK Matrix

Tasks