General
-
Target
bawag.apk
-
Size
3.5MB
-
Sample
220406-hcb6nabde8
-
MD5
d61a1d957f3f509220adcd1e7f975153
-
SHA1
df6c31c0e052b861b73e12dbf15942a9d5aa7770
-
SHA256
6615ce1e651653426e799bc5e07823ed6628c89fea5e7ee372d7440968ef028e
-
SHA512
5574cba6fbe072945a1e00f5889ee9a6fde336002e636046a8f6c4a865981465bf37f67213a3c8a41c65a53916da9b6607c5441ed83969ffee358e931c24be5c
Static task
static1
Behavioral task
behavioral1
Sample
bawag.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
bawag.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
bawag.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
bawag.apk
-
Size
3.5MB
-
MD5
d61a1d957f3f509220adcd1e7f975153
-
SHA1
df6c31c0e052b861b73e12dbf15942a9d5aa7770
-
SHA256
6615ce1e651653426e799bc5e07823ed6628c89fea5e7ee372d7440968ef028e
-
SHA512
5574cba6fbe072945a1e00f5889ee9a6fde336002e636046a8f6c4a865981465bf37f67213a3c8a41c65a53916da9b6607c5441ed83969ffee358e931c24be5c
Score10/10-
Hydra Payload
-
Makes use of the framework's Accessibility service.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-