General

  • Target

    ICICI Bank_1.0.apk

  • Size

    2.0MB

  • Sample

    240803-m42b3swcle

  • MD5

    1664a3c4fcd719c826f3f8f9af4596c9

  • SHA1

    15cebd54b0ca986af8cc8d78160ce4795f423c4e

  • SHA256

    a65f33baad5de4e7dea2242d02c9dbd909abfd7b7f0821de77fadfa3cf4bf8d3

  • SHA512

    74a18512707bd6299e668d2a971b033499fee28e82c10ddbca80a7c0f496437fede8c13dba7aeff677fdec82e583aff66ff21a4125f1d56e3865bf73f44d1295

  • SSDEEP

    49152:Qjxch3DQIMuNNCI1kmpkxveB8XwxpvnG6gT89:QdchMT6wmCdeB8XAGh89

Malware Config

Extracted

Family

axbanker

C2

https://zero-a4c52-default-rtdb.firebaseio.com

Targets

    • Target

      ICICI Bank_1.0.apk

    • Size

      2.0MB

    • MD5

      1664a3c4fcd719c826f3f8f9af4596c9

    • SHA1

      15cebd54b0ca986af8cc8d78160ce4795f423c4e

    • SHA256

      a65f33baad5de4e7dea2242d02c9dbd909abfd7b7f0821de77fadfa3cf4bf8d3

    • SHA512

      74a18512707bd6299e668d2a971b033499fee28e82c10ddbca80a7c0f496437fede8c13dba7aeff677fdec82e583aff66ff21a4125f1d56e3865bf73f44d1295

    • SSDEEP

      49152:Qjxch3DQIMuNNCI1kmpkxveB8XwxpvnG6gT89:QdchMT6wmCdeB8XAGh89

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks