General

  • Target

    install.apk

  • Size

    2.4MB

  • Sample

    210615-576fzatjjj

  • MD5

    81e5d4cb43893bd79d26fb589bb9d178

  • SHA1

    9f2278233e96766ea536d781c4bce7ba719ffb73

  • SHA256

    417c5edf9255d9320904204efaf804ddd9be754dcccc2e5f136a32c5a940f28a

  • SHA512

    0e6349c16fe35e3b9c7b47dec1f2f1719bdc7bb71688ec90f6422214ee6ca251538ae8ba79f21a46a8738e687b344e690793887ef2b1bfb45876d6db28724b3c

Malware Config

Targets

    • Target

      install.apk

    • Size

      2.4MB

    • MD5

      81e5d4cb43893bd79d26fb589bb9d178

    • SHA1

      9f2278233e96766ea536d781c4bce7ba719ffb73

    • SHA256

      417c5edf9255d9320904204efaf804ddd9be754dcccc2e5f136a32c5a940f28a

    • SHA512

      0e6349c16fe35e3b9c7b47dec1f2f1719bdc7bb71688ec90f6422214ee6ca251538ae8ba79f21a46a8738e687b344e690793887ef2b1bfb45876d6db28724b3c

    • BlackRock

      BlackRock is an android banker based on Xerxes banking Trojan.

    • BlackRock Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks