General

  • Target

    a40c7cabf874517f5d3d069e0377fa9348e10344000e39717c1a6571939ba7c0

  • Size

    29.1MB

  • Sample

    240410-qeqqtsgg76

  • MD5

    54a85378f28085923115ee44f540ff8a

  • SHA1

    2e40f7fd49fa8538879f90a85300247fbf2f8f67

  • SHA256

    a40c7cabf874517f5d3d069e0377fa9348e10344000e39717c1a6571939ba7c0

  • SHA512

    853d315b460f899c3b4e7e2d6e071763dea1f4c58f8ea1547d8a234eda12e7ee8a1b2c4c5f51f7f4074061f3c50dc5e1892e33520d0b7eec3a82e3f1c4c74917

  • SSDEEP

    393216:bjd8b3Stod1v3uFwCPwmSPk3biaOhECW1Fypl+W9ESATkXQY0/rBxqHoyvc2IG6a:ZbKhE3cYQAYA/q3Qq2w2AA+1Aphm

Malware Config

Extracted

Family

bahamut

C2

https://ft8hua063okwfdcu21pw.de/api/v0.0.1/device/

Targets

    • Target

      a40c7cabf874517f5d3d069e0377fa9348e10344000e39717c1a6571939ba7c0

    • Size

      29.1MB

    • MD5

      54a85378f28085923115ee44f540ff8a

    • SHA1

      2e40f7fd49fa8538879f90a85300247fbf2f8f67

    • SHA256

      a40c7cabf874517f5d3d069e0377fa9348e10344000e39717c1a6571939ba7c0

    • SHA512

      853d315b460f899c3b4e7e2d6e071763dea1f4c58f8ea1547d8a234eda12e7ee8a1b2c4c5f51f7f4074061f3c50dc5e1892e33520d0b7eec3a82e3f1c4c74917

    • SSDEEP

      393216:bjd8b3Stod1v3uFwCPwmSPk3biaOhECW1Fypl+W9ESATkXQY0/rBxqHoyvc2IG6a:ZbKhE3cYQAYA/q3Qq2w2AA+1Aphm

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the call log.

MITRE ATT&CK Matrix

Tasks