General

  • Target

    17ef1a468a57dbbcd84e32df86509106e3065a82caa47a469cb3a694ce88c78c

  • Size

    8.1MB

  • Sample

    240410-ls4sdsbb86

  • MD5

    869ae17c011a213560c04e97e5b53a63

  • SHA1

    6bcf1dd35db16be69a82a710cc8bacc752c1fe7f

  • SHA256

    17ef1a468a57dbbcd84e32df86509106e3065a82caa47a469cb3a694ce88c78c

  • SHA512

    409ec2d3a9c7b332408f391f7f722306aea4efb074d855ca1dd8d53690e22bd41c674837496ef354358ea66abbfd2eefd6c0f7c1bfa26528411a87956f42e5d8

  • SSDEEP

    98304:xFLArj5Ejc7iKoNT/OdNRo/fx0tEL8pYxbwcBkvk23mIw8XepzLYr/JMmWuShwCn:R/TBGNk0GL8pKfBk7mIXrRZSmCKXTaCe

Score
10/10

Malware Config

Extracted

Family

bahamut

C2

https://r4dc3btbyzip0edkbykb1qteulwb.de/

Targets

    • Target

      17ef1a468a57dbbcd84e32df86509106e3065a82caa47a469cb3a694ce88c78c

    • Size

      8.1MB

    • MD5

      869ae17c011a213560c04e97e5b53a63

    • SHA1

      6bcf1dd35db16be69a82a710cc8bacc752c1fe7f

    • SHA256

      17ef1a468a57dbbcd84e32df86509106e3065a82caa47a469cb3a694ce88c78c

    • SHA512

      409ec2d3a9c7b332408f391f7f722306aea4efb074d855ca1dd8d53690e22bd41c674837496ef354358ea66abbfd2eefd6c0f7c1bfa26528411a87956f42e5d8

    • SSDEEP

      98304:xFLArj5Ejc7iKoNT/OdNRo/fx0tEL8pYxbwcBkvk23mIw8XepzLYr/JMmWuShwCn:R/TBGNk0GL8pKfBk7mIXrRZSmCKXTaCe

    Score
    1/10
    • Target

      vc.apk

    • Size

      4.7MB

    • MD5

      88d421b5b9a7f52f1a961e52c49019b1

    • SHA1

      1c69cd22dd43e313a4d2369ec382a30b661d16c1

    • SHA256

      20a520aa0437428e4f93157979eaf181f3c3276abaea6ad01ce083ffa6e55e39

    • SHA512

      2767836d7e3c71c9f1b2bf1c3be0779a054d7892ce1582d6121172bcba58541006a10cc278fa2bf9583d04e4c9257f463501f8b7bc2d2fe94a20c89c4ebb3b79

    • SSDEEP

      98304:xti9x0frPpcI72EEjpDGKz+4NnPV+hNd8NTNrl+P3eWp0CHvwxU:9T725nxPQNSrgPuYHIxU

    Score
    6/10
    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks