General

  • Target

    com.baniiz.kedra.apk

  • Size

    8.1MB

  • Sample

    241110-rnd9tsyekg

  • MD5

    f46d9bbfdf0f4dc2700c9ba2a97f6bb6

  • SHA1

    e7b00fc293206af92bdda8bbf1aeb2b21a89802c

  • SHA256

    4e3f9b875acc9c3bc61640b5f1f5657cada06b9d329c51d5e692c0fb123cec48

  • SHA512

    be72caf0b9f088c5f5e603ac8610f7a8691cc2c48a93314029df3cc92f066f20c97cd4d4b668a2dc3ce2561a881996fc678c6df23116c66a8246e38158d4a881

  • SSDEEP

    196608:ImL6smkwhX0V83qtg8mUzlaLEJaDRDTDYr:ssFwrwg8n0MaVncr

Malware Config

Targets

    • Target

      com.baniiz.kedra.apk

    • Size

      8.1MB

    • MD5

      f46d9bbfdf0f4dc2700c9ba2a97f6bb6

    • SHA1

      e7b00fc293206af92bdda8bbf1aeb2b21a89802c

    • SHA256

      4e3f9b875acc9c3bc61640b5f1f5657cada06b9d329c51d5e692c0fb123cec48

    • SHA512

      be72caf0b9f088c5f5e603ac8610f7a8691cc2c48a93314029df3cc92f066f20c97cd4d4b668a2dc3ce2561a881996fc678c6df23116c66a8246e38158d4a881

    • SSDEEP

      196608:ImL6smkwhX0V83qtg8mUzlaLEJaDRDTDYr:ssFwrwg8n0MaVncr

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks