General
-
Target
746e5ebaf6b6d5c6ef3cc0be32fbd60380aca8632c3c10059e1021d99bfbee75.bin
-
Size
1.9MB
-
Sample
240208-1yf1vabe6z
-
MD5
0cc4b6fbf14d7af736bfade09b229aa5
-
SHA1
6a2c67003bd89eb44e3ddee2977d207d83863198
-
SHA256
746e5ebaf6b6d5c6ef3cc0be32fbd60380aca8632c3c10059e1021d99bfbee75
-
SHA512
636f2c7d90308cab5df508c373cd31d61db37a3b0f99e18273f07d49aa6bfb89f3940bc7a46c2e7dd28fbf61520a8b397b0f47f1fc76567c280d042afc91a014
-
SSDEEP
49152:Zy/1YOQeYwhDLd/uDwz+zxPGYeipgqf+O:MQpQpuDwzexesuqGO
Static task
static1
Behavioral task
behavioral1
Sample
746e5ebaf6b6d5c6ef3cc0be32fbd60380aca8632c3c10059e1021d99bfbee75.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
746e5ebaf6b6d5c6ef3cc0be32fbd60380aca8632c3c10059e1021d99bfbee75.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
746e5ebaf6b6d5c6ef3cc0be32fbd60380aca8632c3c10059e1021d99bfbee75.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
746e5ebaf6b6d5c6ef3cc0be32fbd60380aca8632c3c10059e1021d99bfbee75.bin
-
Size
1.9MB
-
MD5
0cc4b6fbf14d7af736bfade09b229aa5
-
SHA1
6a2c67003bd89eb44e3ddee2977d207d83863198
-
SHA256
746e5ebaf6b6d5c6ef3cc0be32fbd60380aca8632c3c10059e1021d99bfbee75
-
SHA512
636f2c7d90308cab5df508c373cd31d61db37a3b0f99e18273f07d49aa6bfb89f3940bc7a46c2e7dd28fbf61520a8b397b0f47f1fc76567c280d042afc91a014
-
SSDEEP
49152:Zy/1YOQeYwhDLd/uDwz+zxPGYeipgqf+O:MQpQpuDwzexesuqGO
Score10/10-
BlackRock
BlackRock is an android banker based on Xerxes banking Trojan.
-
BlackRock payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-