Malware Analysis Report

2025-01-19 07:43

Sample ID 240104-thfltaeecr
Target 507a817a93737700fb9f1f8770052bf5c3cdbc1ff0c4d7b0186c2f9c6956ed1e
SHA256 507a817a93737700fb9f1f8770052bf5c3cdbc1ff0c4d7b0186c2f9c6956ed1e
Tags
spybanker
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

507a817a93737700fb9f1f8770052bf5c3cdbc1ff0c4d7b0186c2f9c6956ed1e

Threat Level: Known bad

The file 507a817a93737700fb9f1f8770052bf5c3cdbc1ff0c4d7b0186c2f9c6956ed1e was found to be: Known bad.

Malicious Activity Summary

spybanker

Spybanker family

Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-01-04 16:03

Signatures

Spybanker family

spybanker

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-04 16:03

Reported

2024-01-04 16:06

Platform

android-x64-arm64-20231215-en

Max time kernel

3577195s

Max time network

145s

Command Line

com.bkhck.mellat

Signatures

N/A

Processes

com.bkhck.mellat

Network

Country Destination Domain Proto
GB 142.250.200.46:443 tcp
GB 142.250.200.46:443 tcp
GB 172.217.169.10:443 udp
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 udp
US 1.1.1.1:53 homanew.fun udp
US 1.1.1.1:53 ssl.google-analytics.com udp
FR 216.58.201.104:443 ssl.google-analytics.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

N/A