General

  • Target

    69f31e89d24f1fa4bc66f30232283fbee716ebecfeadc123a48887288afeaed7

  • Size

    4.3MB

  • Sample

    220521-d9775shag4

  • MD5

    cc98be170a7e6878172105eca0cb7997

  • SHA1

    8ff5df1bd116500238ea4e4a57b24ab692e7e3bc

  • SHA256

    69f31e89d24f1fa4bc66f30232283fbee716ebecfeadc123a48887288afeaed7

  • SHA512

    ffff2b68df06ccaedd537389e9db1fc55aa650357da59b277b63b5c5f6522e0f4e32713809bcb3a5d13c7e5c9125e266c3d28e447ab6c0d909df8488dd4dec70

Malware Config

Targets

    • Target

      69f31e89d24f1fa4bc66f30232283fbee716ebecfeadc123a48887288afeaed7

    • Size

      4.3MB

    • MD5

      cc98be170a7e6878172105eca0cb7997

    • SHA1

      8ff5df1bd116500238ea4e4a57b24ab692e7e3bc

    • SHA256

      69f31e89d24f1fa4bc66f30232283fbee716ebecfeadc123a48887288afeaed7

    • SHA512

      ffff2b68df06ccaedd537389e9db1fc55aa650357da59b277b63b5c5f6522e0f4e32713809bcb3a5d13c7e5c9125e266c3d28e447ab6c0d909df8488dd4dec70

    • BlackRock

      BlackRock is an android banker based on Xerxes banking Trojan.

    • BlackRock Payload

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks