General

  • Target

    Whatsapp-CuBlack-Clone-v17.apk

  • Size

    80.2MB

  • Sample

    240901-qpzrgsscmd

  • MD5

    e6ff31beccb7ef842cbb08d117c44ba6

  • SHA1

    8049a79abace487104507cf38f562912162a5244

  • SHA256

    75372e4899e8b4074cfa2ff2fa51ae30c7a9f9c82f01bfeedf77d5b07d9038a0

  • SHA512

    cbcba307f52d684d4bfa92344a0cf32887bc6fcafcbbc3eb16595263d6920273dbffbe71df2e9936fb99f85a38ce220f7eb74dc643749812df70f322a9222072

  • SSDEEP

    1572864:P3uGZsJCC55suWYahu4H2U+X2itPwpJhq0Xe910KSY8EvlOjAQixW0MmDq3F:WhCaWY2zNoGqe410QOIW0rDq3F

Malware Config

Targets

    • Target

      Whatsapp-CuBlack-Clone-v17.apk

    • Size

      80.2MB

    • MD5

      e6ff31beccb7ef842cbb08d117c44ba6

    • SHA1

      8049a79abace487104507cf38f562912162a5244

    • SHA256

      75372e4899e8b4074cfa2ff2fa51ae30c7a9f9c82f01bfeedf77d5b07d9038a0

    • SHA512

      cbcba307f52d684d4bfa92344a0cf32887bc6fcafcbbc3eb16595263d6920273dbffbe71df2e9936fb99f85a38ce220f7eb74dc643749812df70f322a9222072

    • SSDEEP

      1572864:P3uGZsJCC55suWYahu4H2U+X2itPwpJhq0Xe910KSY8EvlOjAQixW0MmDq3F:WhCaWY2zNoGqe410QOIW0rDq3F

    • Android Triada payload

    • Triada

      Triada is an Android banking trojan first seen in 2016.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks