Resubmissions

10-11-2024 08:38

241110-kjydkstdlb 7

10-11-2024 08:29

241110-kdjy1atclh 7

General

  • Target

    Indusind Bank v94.apk

  • Size

    3.0MB

  • Sample

    241110-kjydkstdlb

  • MD5

    f3b9b1b44ae0ba6b6d90ce886c5482bb

  • SHA1

    5843644659c2f24c5e3f95a60da4e4d179a7a8d4

  • SHA256

    085f5740451dd91c02aa1179a1cd0d315ce7bcd2f3867f9831afff48d8daaed7

  • SHA512

    de89a70cee16847a0fb0652cb04dae9d0b1e83e4a3a5f3ce082a5c318312e6f23bd22a1bcbf1a59557b58627038ca787635cc2b55ddbeac50adef41d25971b98

  • SSDEEP

    49152:p3g92KPXpundj3IBboLbzU24CXrZsrkmc1cnOrZ4NTPFHT5gr41H:UP5uZqoJ4uZsBGcnOGlX

Malware Config

Targets

    • Target

      Indusind Bank v94.apk

    • Size

      3.0MB

    • MD5

      f3b9b1b44ae0ba6b6d90ce886c5482bb

    • SHA1

      5843644659c2f24c5e3f95a60da4e4d179a7a8d4

    • SHA256

      085f5740451dd91c02aa1179a1cd0d315ce7bcd2f3867f9831afff48d8daaed7

    • SHA512

      de89a70cee16847a0fb0652cb04dae9d0b1e83e4a3a5f3ce082a5c318312e6f23bd22a1bcbf1a59557b58627038ca787635cc2b55ddbeac50adef41d25971b98

    • SSDEEP

      49152:p3g92KPXpundj3IBboLbzU24CXrZsrkmc1cnOrZ4NTPFHT5gr41H:UP5uZqoJ4uZsBGcnOGlX

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks