General
-
Target
04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712
-
Size
96.4MB
-
Sample
241009-j2fe2sxblq
-
MD5
e2c2ae5d4181e82c2c8511aa3c573260
-
SHA1
bc55e49227eb619229c7583d40514100c1877867
-
SHA256
04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712
-
SHA512
4651550ae57027ef3c4511a9195d9a349830dbe61b440a052ff0168e2161332793f50a47a67078b423f6a673f875a52e9e64465a913d914c82623165e02341fa
-
SSDEEP
3145728:THfDwzvQgwXhessH6zD7ysCtmsigFxE8Oad:jf8jQgwXhessH6zJ9gQid
Behavioral task
behavioral1
Sample
04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712.apk
Resource
android-x64-20240624-en
Malware Config
Extracted
axbanker
https://api-7040530283788474945-532393-default-rtdb.firebaseio.com
https://api-7040530283788474945-532393.firebaseio.com
Targets
-
-
Target
04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712
-
Size
96.4MB
-
MD5
e2c2ae5d4181e82c2c8511aa3c573260
-
SHA1
bc55e49227eb619229c7583d40514100c1877867
-
SHA256
04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712
-
SHA512
4651550ae57027ef3c4511a9195d9a349830dbe61b440a052ff0168e2161332793f50a47a67078b423f6a673f875a52e9e64465a913d914c82623165e02341fa
-
SSDEEP
3145728:THfDwzvQgwXhessH6zD7ysCtmsigFxE8Oad:jf8jQgwXhessH6zJ9gQid
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Checks the presence of a debugger
-