General

  • Target

    base.apk

  • Size

    8.6MB

  • Sample

    240913-xa5shssanl

  • MD5

    0f9e499294caacbcd515eeb8ce437afe

  • SHA1

    2c9fd958e5a5474a358e2e561c19b244ca2ee356

  • SHA256

    3e545df7b9e9bf2221eb42a7d0d9b45183ea205583767d612c4cf489c9cfe962

  • SHA512

    8377ff9bd8f17739b4f76f157d87a8fb666ab75cc114c69509cfc4d947435c989b2df0c81cedab3189f4b42cf2b7ec9beb03523ba2506b9cbd2427f218a17b3d

  • SSDEEP

    196608:vFNHoD0zdv10PkSrm7QeyZA0VQMVQ8VQaVQwVQ6:vXIDqd9JSS7QeyO0iMi8iaiwi6

Malware Config

Extracted

Family

rafelrat

C2

https://lovehurts.000webhostapp.com/Server_Panel/public/commands.php

Targets

    • Target

      base.apk

    • Size

      8.6MB

    • MD5

      0f9e499294caacbcd515eeb8ce437afe

    • SHA1

      2c9fd958e5a5474a358e2e561c19b244ca2ee356

    • SHA256

      3e545df7b9e9bf2221eb42a7d0d9b45183ea205583767d612c4cf489c9cfe962

    • SHA512

      8377ff9bd8f17739b4f76f157d87a8fb666ab75cc114c69509cfc4d947435c989b2df0c81cedab3189f4b42cf2b7ec9beb03523ba2506b9cbd2427f218a17b3d

    • SSDEEP

      196608:vFNHoD0zdv10PkSrm7QeyZA0VQMVQ8VQaVQwVQ6:vXIDqd9JSS7QeyO0iMi8iaiwi6

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Legitimate hosting services abused for malware hosting/C2

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Probable phishing domain

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks