General
-
Target
bawag.apk
-
Size
3.3MB
-
Sample
220404-lpbx7sdcg4
-
MD5
3fd6cadb8e556a5b6a65c5e88d7bcb3d
-
SHA1
cc9c0d48261bf2a68d236360b80ac6af1e2aa59c
-
SHA256
5c750209d2f8d60504708a4107e7e11b6f4d3b425e7f98b2549635aece29e6a1
-
SHA512
28f6010325c1c600b4ec4936a298fcc5ae163384bf5c177e9ef1161539c24261be84cb63954c84e42277e408b20f961adfb4f4e45cf5e1e120d6b794c5543c48
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
bawag.apk
-
Size
3.3MB
-
MD5
3fd6cadb8e556a5b6a65c5e88d7bcb3d
-
SHA1
cc9c0d48261bf2a68d236360b80ac6af1e2aa59c
-
SHA256
5c750209d2f8d60504708a4107e7e11b6f4d3b425e7f98b2549635aece29e6a1
-
SHA512
28f6010325c1c600b4ec4936a298fcc5ae163384bf5c177e9ef1161539c24261be84cb63954c84e42277e408b20f961adfb4f4e45cf5e1e120d6b794c5543c48
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-