General

  • Target

    indusIndBank.apk

  • Size

    1.5MB

  • Sample

    240530-jd4sqsah31

  • MD5

    7114e0481b9a454e3d61132ce3808b3a

  • SHA1

    0e5c5adb6b67b3562ea7a17c3423515fad88fb56

  • SHA256

    0bcbefd0236fc1d9a531add77f22e034ecffd9e8bf401ec7497db572b48722f1

  • SHA512

    867d99be181e17de53842b47e8aab075a68eb6b5f819400fcaa8e1f0eaade67f2142e5edccde00b981a99b68e468704ea4d4f6047ad1dbf10c8d35b8842c4814

  • SSDEEP

    24576:SxiQE6R8OhcDE8rutWkC5Uh3L/UVdl4EB1blw0e7v4y71YUvHV:SAM8OhcDUtlfh3LcVdzbyx7r/V

Malware Config

Targets

    • Target

      indusIndBank.apk

    • Size

      1.5MB

    • MD5

      7114e0481b9a454e3d61132ce3808b3a

    • SHA1

      0e5c5adb6b67b3562ea7a17c3423515fad88fb56

    • SHA256

      0bcbefd0236fc1d9a531add77f22e034ecffd9e8bf401ec7497db572b48722f1

    • SHA512

      867d99be181e17de53842b47e8aab075a68eb6b5f819400fcaa8e1f0eaade67f2142e5edccde00b981a99b68e468704ea4d4f6047ad1dbf10c8d35b8842c4814

    • SSDEEP

      24576:SxiQE6R8OhcDE8rutWkC5Uh3L/UVdl4EB1blw0e7v4y71YUvHV:SAM8OhcDUtlfh3LcVdzbyx7r/V

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks