General
-
Target
ICICI Bank_1.0.apk
-
Size
2.0MB
-
Sample
240803-m42b3swcle
-
MD5
1664a3c4fcd719c826f3f8f9af4596c9
-
SHA1
15cebd54b0ca986af8cc8d78160ce4795f423c4e
-
SHA256
a65f33baad5de4e7dea2242d02c9dbd909abfd7b7f0821de77fadfa3cf4bf8d3
-
SHA512
74a18512707bd6299e668d2a971b033499fee28e82c10ddbca80a7c0f496437fede8c13dba7aeff677fdec82e583aff66ff21a4125f1d56e3865bf73f44d1295
-
SSDEEP
49152:Qjxch3DQIMuNNCI1kmpkxveB8XwxpvnG6gT89:QdchMT6wmCdeB8XAGh89
Behavioral task
behavioral1
Sample
ICICI Bank_1.0.apk
Resource
android-x64-20240624-en
Malware Config
Extracted
axbanker
https://zero-a4c52-default-rtdb.firebaseio.com
Targets
-
-
Target
ICICI Bank_1.0.apk
-
Size
2.0MB
-
MD5
1664a3c4fcd719c826f3f8f9af4596c9
-
SHA1
15cebd54b0ca986af8cc8d78160ce4795f423c4e
-
SHA256
a65f33baad5de4e7dea2242d02c9dbd909abfd7b7f0821de77fadfa3cf4bf8d3
-
SHA512
74a18512707bd6299e668d2a971b033499fee28e82c10ddbca80a7c0f496437fede8c13dba7aeff677fdec82e583aff66ff21a4125f1d56e3865bf73f44d1295
-
SSDEEP
49152:Qjxch3DQIMuNNCI1kmpkxveB8XwxpvnG6gT89:QdchMT6wmCdeB8XAGh89
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-