General

  • Target

    0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.bin

  • Size

    4.9MB

  • Sample

    240807-12s5ksydkf

  • MD5

    acabd40f1b648a85d436b66051e956ef

  • SHA1

    946356509ab3ecf8a188f41a5341c173067765bc

  • SHA256

    0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949

  • SHA512

    83028ab602c2a660a77e770a8d311690c6605b1694052d65ab49ac4d1264be29fd1aa48ac387b3c0ccad639ee10e3053f9bd54d8cc4307a0ff872d015850afca

  • SSDEEP

    98304:5DLAThoeWVq6EiHQnNC0fDWuAHkPM2mrRH5XbxaUqtUQ08tKYNbLIemcFU:53IVWVzHQNjauE0M2gRH5XbKrtHS

Malware Config

Extracted

Family

nexus

C2

http://45.143.138.133

http://gecebizimhaberlerdeizle.co.vu/

http://haberasanbizdenozelgundem.co.vu/

Targets

    • Target

      0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.bin

    • Size

      4.9MB

    • MD5

      acabd40f1b648a85d436b66051e956ef

    • SHA1

      946356509ab3ecf8a188f41a5341c173067765bc

    • SHA256

      0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949

    • SHA512

      83028ab602c2a660a77e770a8d311690c6605b1694052d65ab49ac4d1264be29fd1aa48ac387b3c0ccad639ee10e3053f9bd54d8cc4307a0ff872d015850afca

    • SSDEEP

      98304:5DLAThoeWVq6EiHQnNC0fDWuAHkPM2mrRH5XbxaUqtUQ08tKYNbLIemcFU:53IVWVzHQNjauE0M2gRH5XbKrtHS

    • Nexus

      Nexus is an Android banking trojan related to the SOVA banking trojan.

    • Removes its main activity from the application launcher

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks