General
-
Target
bawag.apk
-
Size
3.4MB
-
Sample
220401-lt2pesecbp
-
MD5
c34d943b9dc1618d424af57cbdfa4a6e
-
SHA1
6e6487c3b689201b43621b47319a7f6514fa64ea
-
SHA256
3fe3d4f0cbdebb784d1a96dc7d9a4ecd4e9c080860bfa87e50084930aa0d4198
-
SHA512
b46ae181e732b00c3eebef1b2e30db786a2a28075de072f98baf54c84cbff674c74500add8f0b58a674cc566f6b982c8c010629102dd3a1a94f8cd92996d78c3
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
bawag.apk
-
Size
3.4MB
-
MD5
c34d943b9dc1618d424af57cbdfa4a6e
-
SHA1
6e6487c3b689201b43621b47319a7f6514fa64ea
-
SHA256
3fe3d4f0cbdebb784d1a96dc7d9a4ecd4e9c080860bfa87e50084930aa0d4198
-
SHA512
b46ae181e732b00c3eebef1b2e30db786a2a28075de072f98baf54c84cbff674c74500add8f0b58a674cc566f6b982c8c010629102dd3a1a94f8cd92996d78c3
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-