General
-
Target
59a60aa90fbc7fb8dd6b4f2b9b60c6c70fd57cda68c584d045813d2e6b1414a1.bin
-
Size
1.8MB
-
Sample
241012-1yh57stdrg
-
MD5
42df6b4cfa9b0a93a2041eff2f67b127
-
SHA1
f26549c0b636a16e1955720935984d2871104a59
-
SHA256
59a60aa90fbc7fb8dd6b4f2b9b60c6c70fd57cda68c584d045813d2e6b1414a1
-
SHA512
4e5f8cbd4920a9cc1674b3bb86763f3e00496adfa1767d44b0f8014b7aceae1ef946005bf88ecb8d7ee12620c1a51404eeea7b36e95f2a32b6f73312ccab9149
-
SSDEEP
24576:7Y1UDWDmciRY8/+NjpjhDMLjxI2mglXtGfj+dLwXeOYOuxjKqxlYG0xBQak:7Y1QcKY8GNjxhDMLj+gLA6x5dYG0xc
Behavioral task
behavioral1
Sample
59a60aa90fbc7fb8dd6b4f2b9b60c6c70fd57cda68c584d045813d2e6b1414a1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
59a60aa90fbc7fb8dd6b4f2b9b60c6c70fd57cda68c584d045813d2e6b1414a1.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
59a60aa90fbc7fb8dd6b4f2b9b60c6c70fd57cda68c584d045813d2e6b1414a1.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
ajina
77.221.136.21:8080
-
target_apps
air.com.ssdsoftwaresolutions.clickuz
am.easypay.easywallet
am.imwallet.android
am.mts.mobidram
am.upay.android
app.ab.banking
arca.am.arca
az.anipay.usermbanking
az.cib.app
az.epul.technopay.android
az.portmanat.app
az.portmanat.newapp
az.pulpal
az.tezpay.app
com.binance.dev
com.eg.android.AlipayGphone
com.fastshift.wallet
com.haypost.haypost_mobile
com.intervale.baitushum
com.ipc_app
com.kp.kompanion
com.kp.megapay.kg
com.m10
com.maanavan.mb_kyrgyzstan
com.mbf.fsclient_android
com.moneybookers.skrillpayments
com.ofss.digx.mobile.android.allied
com.olsoft.mats.prod
com.pyypl
com.safaroff.million_android
com.wefawvevw.app
expressbank.wallet.expresspay
hesab.az
is.siminn.siminnpay
kg.o.nurtelecom
kg.rsk.mb
kz.optimabank.optima
lt.lemonlabs.android.paysera
mpay.emanat
namba.wallet.nambaone
net.humans.fintech_uz
net.kicb.ibankprod
nsp.solutions.kassam
ru.deltapay.puntopago.telcell
ru.mitapp.beeline_wallet
ru.tsk.ftc.bender.qpay
ru.yoo.yoomoney
uz.dida.payme
uz.marokand.upay
uz.paynet.app
uz.paynet.flagship_mobile
uz.soliq.mobile
uz.tune.tenge
Targets
-
-
Target
59a60aa90fbc7fb8dd6b4f2b9b60c6c70fd57cda68c584d045813d2e6b1414a1.bin
-
Size
1.8MB
-
MD5
42df6b4cfa9b0a93a2041eff2f67b127
-
SHA1
f26549c0b636a16e1955720935984d2871104a59
-
SHA256
59a60aa90fbc7fb8dd6b4f2b9b60c6c70fd57cda68c584d045813d2e6b1414a1
-
SHA512
4e5f8cbd4920a9cc1674b3bb86763f3e00496adfa1767d44b0f8014b7aceae1ef946005bf88ecb8d7ee12620c1a51404eeea7b36e95f2a32b6f73312ccab9149
-
SSDEEP
24576:7Y1UDWDmciRY8/+NjpjhDMLjxI2mglXtGfj+dLwXeOYOuxjKqxlYG0xBQak:7Y1QcKY8GNjxhDMLj+gLA6x5dYG0xc
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-