General

  • Target

    04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712

  • Size

    96.4MB

  • Sample

    241009-j2fe2sxblq

  • MD5

    e2c2ae5d4181e82c2c8511aa3c573260

  • SHA1

    bc55e49227eb619229c7583d40514100c1877867

  • SHA256

    04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712

  • SHA512

    4651550ae57027ef3c4511a9195d9a349830dbe61b440a052ff0168e2161332793f50a47a67078b423f6a673f875a52e9e64465a913d914c82623165e02341fa

  • SSDEEP

    3145728:THfDwzvQgwXhessH6zD7ysCtmsigFxE8Oad:jf8jQgwXhessH6zJ9gQid

Malware Config

Extracted

Family

axbanker

C2

https://api-7040530283788474945-532393-default-rtdb.firebaseio.com

https://api-7040530283788474945-532393.firebaseio.com

Targets

    • Target

      04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712

    • Size

      96.4MB

    • MD5

      e2c2ae5d4181e82c2c8511aa3c573260

    • SHA1

      bc55e49227eb619229c7583d40514100c1877867

    • SHA256

      04977adf97e13778670e49e8424212f0f7f0b74a38846597bce83c5af88e1712

    • SHA512

      4651550ae57027ef3c4511a9195d9a349830dbe61b440a052ff0168e2161332793f50a47a67078b423f6a673f875a52e9e64465a913d914c82623165e02341fa

    • SSDEEP

      3145728:THfDwzvQgwXhessH6zD7ysCtmsigFxE8Oad:jf8jQgwXhessH6zJ9gQid

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks