Analysis
-
max time kernel
14s -
max time network
186s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
07/08/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
-
Size
4.9MB
-
MD5
acabd40f1b648a85d436b66051e956ef
-
SHA1
946356509ab3ecf8a188f41a5341c173067765bc
-
SHA256
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949
-
SHA512
83028ab602c2a660a77e770a8d311690c6605b1694052d65ab49ac4d1264be29fd1aa48ac387b3c0ccad639ee10e3053f9bd54d8cc4307a0ff872d015850afca
-
SSDEEP
98304:5DLAThoeWVq6EiHQnNC0fDWuAHkPM2mrRH5XbxaUqtUQ08tKYNbLIemcFU:53IVWVzHQNjauE0M2gRH5XbKrtHS
Malware Config
Extracted
nexus
http://45.143.138.133
http://gecebizimhaberlerdeizle.co.vu/
http://haberasanbizdenozelgundem.co.vu/
Signatures
-
Nexus
Nexus is an Android banking trojan related to the SOVA banking trojan.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.alert.castle/app_DynamicOptDex/uZdhso.json 4930 com.alert.castle -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.alert.castle -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.alert.castle -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com 154 ip-api.com -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.alert.castle -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.alert.castle
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5efa90868a21fc81acd2487e42b63ed58
SHA127c0d7361b8442938e05b5244a42c56ba0565aff
SHA256153f2a70151c465b6fa00babe61d55b6a3e25d22eb96c40194f06242feacff5f
SHA5124ef0f056c76fbecc12c88c4d21a99d0f2ef27cd9fdb1e47cd3257629db6ef81dc91033a27cb2550b85c06d44dae72ecff552e7e4a19ee0dd06577fb8cb5d0c4f
-
Filesize
2.2MB
MD5eb68d6d89a6b39127bc645fa320c79e8
SHA1fea1bc7be40e9b0c34a291dd36294f50fcf92b3e
SHA25645ad8acf5bf7b86c38fbeee3e7b2301f1eaa5fe397a572a4bf6309eedd746285
SHA512b0951befc046ba75c47dec9d1f37307cba9d8ef57bc3c578c84f95dccff968d2ff2b6198cdd139d8439ca3cd65b27419f051e8f140813811f628d00bed24540a
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD53337affdabc3e7130f4e193691864bd7
SHA1e950aa777806b6bbb25b9b2333a843d904b1c500
SHA2568fa09df264ab7c645a479de0c88157378610b518aa048b91f6ca5c579f5f77d2
SHA512e7bf298b5af14d3c236da6b9d7392c263cdccc4709afb37b147214116473b9608a96967de13b63fb0bd25de24e4db8cde79b44b67ec33d1d13e1adc6d72b2103
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD512a641718ea4819cccccd91e253a4e4f
SHA1b81756965f91678e821311421cfdc46faff57be9
SHA25618547e575d357573c4373cf95e7b80295d9dba2dbd0de11749266daf41e57d81
SHA5124bcb4a78514c218897dc0eb5c31230331e6fa48f005881a1055af2a88b0b1b3e3e7ea4814365ba51d341d68faee6442766604ee1d5715ea7cab58f6191f658e7
-
Filesize
108KB
MD51725c1059734b836b2b7bfcd0e8cc497
SHA1d92723365c53426a0af11b399edaec14db3c00f8
SHA25685a1758630ee2b73f8b70189c0b762da8bee39bbef201a81cdea5dcd17ff6030
SHA5123ebcb5f94c8ee6689b8853ab3c1593bccce17ae4ad8b181b270eec2a35876a0be109c55416d80bf160ffbeebe3f0f29f35ebcf1c50a7f78ae6cc8cc861cfe756
-
Filesize
156KB
MD5a46ca5705569f34b65fc95d781a8485f
SHA13539ff3c7d38af1597288c580903aa5ebb033c39
SHA2569f6f52003bb3b1107fe4bfa67a17c54aae026644d2e7c42ec1d2df1cc423be80
SHA512cfc39e4d91cf967f8cd36c02ccc7ec254089d395dfa97926ffa41a981439001e3a3485093e6df6210ea66ed651e6cbb74bdbb31b47edc72e17da193700df33da
-
Filesize
6.1MB
MD5802a753d1ffbc857c8b91fb91d8eb890
SHA164cf4cc4d7feab9004a275fd6a05cadf93917cf7
SHA256ba641a60a99e49f0e0870eaf0ea0d550171108981eec64ff2516b332e28ec839
SHA5125492e875c4cb9135a18d5f20e64359507133493c5bfc3e7dcaf281f750148538dc8b073ad435f314141dbf7c1e8cc5acb2950ad34d4f6865591215343fee2501