General

  • Target

    HEUR-Backdoor.AndroidOS.Ahmyth.t-d4fddc345aea69f08c1182cfb58fae06a414876bc8a579162783c67c0178d054

  • Size

    293KB

  • Sample

    240412-tew5dsbh36

  • MD5

    15d871c35eff08519a7463456229939c

  • SHA1

    f790c0f4fb971fdba89c1c19d6165fb1ccf31a6c

  • SHA256

    d4fddc345aea69f08c1182cfb58fae06a414876bc8a579162783c67c0178d054

  • SHA512

    86fc8d13bef39cc1e0eb807447aa6a70b4d8942c1e9cdb5485746ebe08918bb4daa163dd8e6b7f07145bc94dbc2bfd4c22a4eb2de93df7e4f8bae4ed0d07ee6e

  • SSDEEP

    6144:PX3PWxohsFdpR5+5rgaVJQLGDPPkbHfIq:PnuuhOegPiDHAt

Malware Config

Extracted

Family

ahmyth

C2

http://0.tcp.eu.ngrok.io:13514

Targets

    • Target

      HEUR-Backdoor.AndroidOS.Ahmyth.t-d4fddc345aea69f08c1182cfb58fae06a414876bc8a579162783c67c0178d054

    • Size

      293KB

    • MD5

      15d871c35eff08519a7463456229939c

    • SHA1

      f790c0f4fb971fdba89c1c19d6165fb1ccf31a6c

    • SHA256

      d4fddc345aea69f08c1182cfb58fae06a414876bc8a579162783c67c0178d054

    • SHA512

      86fc8d13bef39cc1e0eb807447aa6a70b4d8942c1e9cdb5485746ebe08918bb4daa163dd8e6b7f07145bc94dbc2bfd4c22a4eb2de93df7e4f8bae4ed0d07ee6e

    • SSDEEP

      6144:PX3PWxohsFdpR5+5rgaVJQLGDPPkbHfIq:PnuuhOegPiDHAt

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Tries to add a device administrator.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks