Analysis
-
max time kernel
3793584s -
max time network
173s -
platform
android_x64 -
resource
android-x64 -
submitted
02-11-2021 19:25
Static task
static1
Behavioral task
behavioral1
Sample
23b67a06bde2bb1737489d447156c66cb7b8ac5d706c38bc043a9a821dcb8008.bin.apk
Resource
android-x64
0 signatures
0 seconds
General
-
Target
23b67a06bde2bb1737489d447156c66cb7b8ac5d706c38bc043a9a821dcb8008.bin.apk
-
Size
3.6MB
-
MD5
8270ad7827396291cb744b4378aa9003
-
SHA1
661a89934ec5e14bcb219f16ee04f18e04c19b1e
-
SHA256
23b67a06bde2bb1737489d447156c66cb7b8ac5d706c38bc043a9a821dcb8008
-
SHA512
820a1e4af0a72058faba0122fff96835639e03c0f0c7645bfd53d01d052c291f3db5484841e672a8e3b613579bf89152008e97ef0a198d5f53f65e71af587dda
Score
10/10
Malware Config
Signatures
-
BlackRock
BlackRock is an android banker based on Xerxes banking Trojan.
-
BlackRock Payload 2 IoCs
resource yara_rule behavioral1/memory/3626-0.dex family_blackrock behavioral1/memory/3626-1.dex family_blackrock -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/elite.orange.toddler/app_DynamicOptDex/IJLOxtb.json 3626 elite.orange.toddler /data/user/0/elite.orange.toddler/app_DynamicOptDex/IJLOxtb.json 3626 elite.orange.toddler