General
-
Target
bawag.apk
-
Size
3.5MB
-
Sample
220401-jspblagfb7
-
MD5
768ec2246d2c92330ba8fafe6513963e
-
SHA1
dbfc889162a1b786c14afe37618d65dca701d0e2
-
SHA256
2cca7cac692513aa01467dd9cda3ea98a2a8cde74380b2826294d283a83f4ce7
-
SHA512
0ca0521a2b5403b607f9df7c27c80d426f2c73dea1692bb6577899ff01ad5aa135da7c52082fe690e4c35c4a64fba40f2a9477ee4e14481d7af7a9a9ba219db0
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
bawag.apk
-
Size
3.5MB
-
MD5
768ec2246d2c92330ba8fafe6513963e
-
SHA1
dbfc889162a1b786c14afe37618d65dca701d0e2
-
SHA256
2cca7cac692513aa01467dd9cda3ea98a2a8cde74380b2826294d283a83f4ce7
-
SHA512
0ca0521a2b5403b607f9df7c27c80d426f2c73dea1692bb6577899ff01ad5aa135da7c52082fe690e4c35c4a64fba40f2a9477ee4e14481d7af7a9a9ba219db0
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-