General

  • Target

    f20a0bac3df3c4d724579608f10beb1e.apk

  • Size

    5.3MB

  • Sample

    240716-mwf16s1gle

  • MD5

    f20a0bac3df3c4d724579608f10beb1e

  • SHA1

    a0aa8c2686309aa0ffe8e63a29d7fb74f5338c05

  • SHA256

    161c8274f6530ee56fc2435577b52e32ebd8e2876dcb0c072898ec112f58767c

  • SHA512

    c6e5ac138d9bb62f244f679e934bf435ad913633114b613e72ad42411a2f5f2256e399ae5fa5d9ce48ecba0b9d9840f04363d3aa8eefa7ebe37006e4bb122171

  • SSDEEP

    98304:bX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LU2ksCqWxi1dcAX7LZoTwr5xpiT0:GvH0fpstpnVMVMAPHZhpLlksd1cA9pN

Malware Config

Extracted

Family

axbanker

C2

https://sheet-14c1d-default-rtdb.firebaseio.com

Targets

    • Target

      f20a0bac3df3c4d724579608f10beb1e.apk

    • Size

      5.3MB

    • MD5

      f20a0bac3df3c4d724579608f10beb1e

    • SHA1

      a0aa8c2686309aa0ffe8e63a29d7fb74f5338c05

    • SHA256

      161c8274f6530ee56fc2435577b52e32ebd8e2876dcb0c072898ec112f58767c

    • SHA512

      c6e5ac138d9bb62f244f679e934bf435ad913633114b613e72ad42411a2f5f2256e399ae5fa5d9ce48ecba0b9d9840f04363d3aa8eefa7ebe37006e4bb122171

    • SSDEEP

      98304:bX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LU2ksCqWxi1dcAX7LZoTwr5xpiT0:GvH0fpstpnVMVMAPHZhpLlksd1cA9pN

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks