General

  • Target

    b420db3dff4637f07caaa145b634106e4c2fc559ae1b4b692271cedbe21b62c8

  • Size

    29.1MB

  • Sample

    240410-qxyjdscg2t

  • MD5

    548674d18b82bc0d58a1b7722029a156

  • SHA1

    c74b006badbb3844843609dd5811ab2cef16d63b

  • SHA256

    b420db3dff4637f07caaa145b634106e4c2fc559ae1b4b692271cedbe21b62c8

  • SHA512

    76fda6a5c9475a8d4a367649002f7875b9be434d3e28fd370a46e3b83d2aefd60ce24693bc1151dc4f8f18519e03f23cccf4e19c7366055aa803015b298a924a

  • SSDEEP

    393216:z3J8b3SRZd1v3uFwCPwmSP8VbiaOhECW1Fypl+W9ESAHRDQ60/rBxqHoyvc2IGpI:+bKhE/cYxU6A/q3lq2sDIMe+1AppO

Malware Config

Extracted

Family

bahamut

C2

https://ft8hua063okwfdcu21pw.de/api/v0.0.1/device/

Targets

    • Target

      b420db3dff4637f07caaa145b634106e4c2fc559ae1b4b692271cedbe21b62c8

    • Size

      29.1MB

    • MD5

      548674d18b82bc0d58a1b7722029a156

    • SHA1

      c74b006badbb3844843609dd5811ab2cef16d63b

    • SHA256

      b420db3dff4637f07caaa145b634106e4c2fc559ae1b4b692271cedbe21b62c8

    • SHA512

      76fda6a5c9475a8d4a367649002f7875b9be434d3e28fd370a46e3b83d2aefd60ce24693bc1151dc4f8f18519e03f23cccf4e19c7366055aa803015b298a924a

    • SSDEEP

      393216:z3J8b3SRZd1v3uFwCPwmSP8VbiaOhECW1Fypl+W9ESAHRDQ60/rBxqHoyvc2IGpI:+bKhE/cYxU6A/q3lq2sDIMe+1AppO

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about running processes on the device.

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the call log.

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks