Resubmissions

23-05-2024 07:38

240523-jgwxashg5y 7

23-05-2024 07:03

240523-hvttesha21 7

23-05-2024 06:23

240523-g5t2hagc61 7

22-05-2024 03:55

240522-ehay1abe3w 7

General

  • Target

    CANARA BANK AADHAR KYC.apk

  • Size

    5.1MB

  • Sample

    240522-ehay1abe3w

  • MD5

    d90a6ead45b6e5149c7c64217cca51ac

  • SHA1

    47b658b064cf3fad14194dced9145ef33b2bf897

  • SHA256

    afec45c1051376d3e8fc57ed5bbe33cb619ab71c88ee20920bb1384ee5c6ea54

  • SHA512

    59ec7e7ecb83e0e29959ee74e278b4944b2bb2cba9107f159c93063464af2da92427b0391ba033a3c4caa3ba327032e2922d57f2ed507a513f1c0e44daace85f

  • SSDEEP

    98304:XKMrJZC1oPBy7ESY173tT9dXKzr0kqqy7jtLtqHgwX3PmMLtuxMDyICcLcOT:aM7oETtTXEgkqrRt67kquIGE

Malware Config

Targets

    • Target

      CANARA BANK AADHAR KYC.apk

    • Size

      5.1MB

    • MD5

      d90a6ead45b6e5149c7c64217cca51ac

    • SHA1

      47b658b064cf3fad14194dced9145ef33b2bf897

    • SHA256

      afec45c1051376d3e8fc57ed5bbe33cb619ab71c88ee20920bb1384ee5c6ea54

    • SHA512

      59ec7e7ecb83e0e29959ee74e278b4944b2bb2cba9107f159c93063464af2da92427b0391ba033a3c4caa3ba327032e2922d57f2ed507a513f1c0e44daace85f

    • SSDEEP

      98304:XKMrJZC1oPBy7ESY173tT9dXKzr0kqqy7jtLtqHgwX3PmMLtuxMDyICcLcOT:aM7oETtTXEgkqrRt67kquIGE

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Mobile v15

Tasks