General

  • Target

    d8a4f7b3a7b23fdc6ebea7659b3e2143ed2271fe931fcd1a378c44f66b4c92c3

  • Size

    2.8MB

  • Sample

    220502-s1m8yagch8

  • MD5

    c9da19102483bfe55b12ed2e0938a149

  • SHA1

    b783ad969487708381b59732f16d14325c6f50a2

  • SHA256

    d8a4f7b3a7b23fdc6ebea7659b3e2143ed2271fe931fcd1a378c44f66b4c92c3

  • SHA512

    db8d61866180bfa7486f81de15f9d57d7fcc5ef5a5939dfec722a8f32c8d7f09ea989531702e0d2ba31040c5b511150f6fb90fcae98aafb01760da8180f3cefd

Malware Config

Targets

    • Target

      d8a4f7b3a7b23fdc6ebea7659b3e2143ed2271fe931fcd1a378c44f66b4c92c3

    • Size

      2.8MB

    • MD5

      c9da19102483bfe55b12ed2e0938a149

    • SHA1

      b783ad969487708381b59732f16d14325c6f50a2

    • SHA256

      d8a4f7b3a7b23fdc6ebea7659b3e2143ed2271fe931fcd1a378c44f66b4c92c3

    • SHA512

      db8d61866180bfa7486f81de15f9d57d7fcc5ef5a5939dfec722a8f32c8d7f09ea989531702e0d2ba31040c5b511150f6fb90fcae98aafb01760da8180f3cefd

    • BlackRock

      BlackRock is an android banker based on Xerxes banking Trojan.

    • BlackRock Payload

    • Makes use of the framework's Accessibility service.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks