General

  • Target

    com.baniiz.kedra.apk

  • Size

    8.1MB

  • Sample

    241110-rc66gayamk

  • MD5

    8c68ca54245f1e1513bf1b15dea5e794

  • SHA1

    657ee46f5f7a14b22fd9c1b6933dfe103a61efe6

  • SHA256

    6b83c98557eb4ff3de7b140f71af4f797cbedb39629031aa8fb12320dff1f01b

  • SHA512

    b2e3d7ac106a3e4e1d0db03ea205d84386e081c00c46492567f392ffc6f830385d4ce0d3fb4e3f8dd6ddd428b5f182202b1318c234202dca3fc34d7146f41a8c

  • SSDEEP

    196608:hLt7gHSGEhfejA5jg8sfzDaLEcyDKD+Dks:T1GEhhjg8e25yOiws

Malware Config

Targets

    • Target

      com.baniiz.kedra.apk

    • Size

      8.1MB

    • MD5

      8c68ca54245f1e1513bf1b15dea5e794

    • SHA1

      657ee46f5f7a14b22fd9c1b6933dfe103a61efe6

    • SHA256

      6b83c98557eb4ff3de7b140f71af4f797cbedb39629031aa8fb12320dff1f01b

    • SHA512

      b2e3d7ac106a3e4e1d0db03ea205d84386e081c00c46492567f392ffc6f830385d4ce0d3fb4e3f8dd6ddd428b5f182202b1318c234202dca3fc34d7146f41a8c

    • SSDEEP

      196608:hLt7gHSGEhfejA5jg8sfzDaLEcyDKD+Dks:T1GEhhjg8e25yOiws

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks