General

  • Target

    HDFC Card.apk

  • Size

    9.2MB

  • Sample

    240425-e5q9hafe2y

  • MD5

    2ab70b712b49c7fd2b41205873a3b2d1

  • SHA1

    9e6cada7f759c628628a0c82031ab1088daae24e

  • SHA256

    33983e8a65df644817c88b27e3ac16e0bc055f8261fc874add69b0e60c85cd1e

  • SHA512

    9884eede66f2b452f9f0efac48733da16a3b402dd09e3fab6a786897b4793e6c2a539af463ba1bf9f1cbbfc73c8d0d3d7e6e2e1eeb11aa647cf36a76b3e9343a

  • SSDEEP

    196608:9ovIfwIhmhoHA0JFQNYG4AE4HeM/1iRUfF3+HzSbOF5TvP5YXP:9o4BhaMQNYG4t4HeEUQOLvRo

Malware Config

Targets

    • Target

      HDFC Card.apk

    • Size

      9.2MB

    • MD5

      2ab70b712b49c7fd2b41205873a3b2d1

    • SHA1

      9e6cada7f759c628628a0c82031ab1088daae24e

    • SHA256

      33983e8a65df644817c88b27e3ac16e0bc055f8261fc874add69b0e60c85cd1e

    • SHA512

      9884eede66f2b452f9f0efac48733da16a3b402dd09e3fab6a786897b4793e6c2a539af463ba1bf9f1cbbfc73c8d0d3d7e6e2e1eeb11aa647cf36a76b3e9343a

    • SSDEEP

      196608:9ovIfwIhmhoHA0JFQNYG4AE4HeM/1iRUfF3+HzSbOF5TvP5YXP:9o4BhaMQNYG4t4HeEUQOLvRo

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

MITRE ATT&CK Matrix

Tasks