General

  • Target

    1cf59c44c2094ed061daa79cf0218e56ae1ef00a0dd38b6d3c16cee10b42d03b

  • Size

    31.7MB

  • Sample

    240410-lw5tvsed8x

  • MD5

    ed7c1a0bcc8818a40c91a23db5476c9c

  • SHA1

    4f05482e93825e6a40af3dfe45f6226a044d8635

  • SHA256

    1cf59c44c2094ed061daa79cf0218e56ae1ef00a0dd38b6d3c16cee10b42d03b

  • SHA512

    1526615ab9b2cc4694e1b22c321f6276ec40856fdde5b7d832182a07a793f24162bdf6bd4e3c6507e8f42713a25109be1a771a7b13215f344f7040ba180774ae

  • SSDEEP

    786432:FlO3Em1FtahYsVNU86F+VQ7TteXoX063s7JyE:FlGEQah7E8+kmTQYx3sdyE

Malware Config

Extracted

Family

bahamut

C2

https://ft8hua063okwfdcu21pw.de/api/v0.0.1/device/

Targets

    • Target

      1cf59c44c2094ed061daa79cf0218e56ae1ef00a0dd38b6d3c16cee10b42d03b

    • Size

      31.7MB

    • MD5

      ed7c1a0bcc8818a40c91a23db5476c9c

    • SHA1

      4f05482e93825e6a40af3dfe45f6226a044d8635

    • SHA256

      1cf59c44c2094ed061daa79cf0218e56ae1ef00a0dd38b6d3c16cee10b42d03b

    • SHA512

      1526615ab9b2cc4694e1b22c321f6276ec40856fdde5b7d832182a07a793f24162bdf6bd4e3c6507e8f42713a25109be1a771a7b13215f344f7040ba180774ae

    • SSDEEP

      786432:FlO3Em1FtahYsVNU86F+VQ7TteXoX063s7JyE:FlGEQah7E8+kmTQYx3sdyE

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads the contacts stored on the device.

    • Reads the content of the call log.

MITRE ATT&CK Mobile v15

Tasks