General

  • Target

    antidot_9f8a49432e76b9c69d33ea228cc44254bc0a58bfa15eb0c51a302c59db81caa3.apk

  • Size

    2.6MB

  • Sample

    240606-l7y6fscg6y

  • MD5

    588d01860865256c378715ad728757cf

  • SHA1

    1c1d2fc881ea0565a372f71baf26454756bd3243

  • SHA256

    9f8a49432e76b9c69d33ea228cc44254bc0a58bfa15eb0c51a302c59db81caa3

  • SHA512

    bf373c2f9083e041d9514b19609259b7fea5624fbbb3da62fec8d7cfdde30a7a273e6577b4e8eb8269c218c17bf4583c69cdba722c2731cb26f55456c22cb220

  • SSDEEP

    49152:Gj7JaeOIhNjdWFLV6yTtPFxLJyGi4svpVeoW9pnU23Vvn3E:GjQeN/SLV6GfJ1KHIU23m

Malware Config

Targets

    • Target

      antidot_9f8a49432e76b9c69d33ea228cc44254bc0a58bfa15eb0c51a302c59db81caa3.apk

    • Size

      2.6MB

    • MD5

      588d01860865256c378715ad728757cf

    • SHA1

      1c1d2fc881ea0565a372f71baf26454756bd3243

    • SHA256

      9f8a49432e76b9c69d33ea228cc44254bc0a58bfa15eb0c51a302c59db81caa3

    • SHA512

      bf373c2f9083e041d9514b19609259b7fea5624fbbb3da62fec8d7cfdde30a7a273e6577b4e8eb8269c218c17bf4583c69cdba722c2731cb26f55456c22cb220

    • SSDEEP

      49152:Gj7JaeOIhNjdWFLV6yTtPFxLJyGi4svpVeoW9pnU23Vvn3E:GjQeN/SLV6GfJ1KHIU23m

    • Checks if the Android device is rooted.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks