General

  • Target

    a71290070f826292c0ce907f21280e46cb4b800163ca3b81301c75710387ff1b

  • Size

    29.1MB

  • Sample

    240410-qhywlscb3w

  • MD5

    7ac30a4488748e4be24c04325f147c9f

  • SHA1

    b54fff5a7f0a279040a4499d5aabce41ea1840fb

  • SHA256

    a71290070f826292c0ce907f21280e46cb4b800163ca3b81301c75710387ff1b

  • SHA512

    2bde3d4bb8a5df81f1e0230cf6e1464853bb52c104ce3da594a0218fee62b83610d673b999c186b158b469c50213be4057c8a23aea2b693fd9083293db44cc9c

  • SSDEEP

    393216:bjd8b3Stod1v3uFwCPwmSPkkbiaOhECW1Fypl+W9ESATJXQY0/rBxqHoyvc2IGif:SbKhE3cYFAYA/q3Yq2w2AEZ+1AphH

Malware Config

Extracted

Family

bahamut

C2

https://ft8hua063okwfdcu21pw.de/api/v0.0.1/device/

Targets

    • Target

      a71290070f826292c0ce907f21280e46cb4b800163ca3b81301c75710387ff1b

    • Size

      29.1MB

    • MD5

      7ac30a4488748e4be24c04325f147c9f

    • SHA1

      b54fff5a7f0a279040a4499d5aabce41ea1840fb

    • SHA256

      a71290070f826292c0ce907f21280e46cb4b800163ca3b81301c75710387ff1b

    • SHA512

      2bde3d4bb8a5df81f1e0230cf6e1464853bb52c104ce3da594a0218fee62b83610d673b999c186b158b469c50213be4057c8a23aea2b693fd9083293db44cc9c

    • SSDEEP

      393216:bjd8b3Stod1v3uFwCPwmSPkkbiaOhECW1Fypl+W9ESATJXQY0/rBxqHoyvc2IGif:SbKhE3cYFAYA/q3Yq2w2AEZ+1AphH

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the call log.

MITRE ATT&CK Mobile v15

Tasks