General

  • Target

    com.baniiz.kedra.apk

  • Size

    8.1MB

  • Sample

    241110-rxgrbayfqh

  • MD5

    83fcfe4b93ff24700cde41812ca28a51

  • SHA1

    643e492aecd476383db0adacaeee2bd07ce6a031

  • SHA256

    02676081188361295141c03569f240e5f023f55f0b01b425f1efa3c1e6f3dbe6

  • SHA512

    fb44b3b716c4a36051fd12bcf56ac54114c37c2226e256fbd1c6d607a652c26dedc475c17654397305e39f6c7a0c077d931415ada13d8bd7c8e3365aaf6b5b7f

  • SSDEEP

    196608:QM7VFRCmhBnv5ftwg8HDzraLEU2DaDCDU5:BVFRTnv5Vwg8X+B2u2A5

Malware Config

Targets

    • Target

      com.baniiz.kedra.apk

    • Size

      8.1MB

    • MD5

      83fcfe4b93ff24700cde41812ca28a51

    • SHA1

      643e492aecd476383db0adacaeee2bd07ce6a031

    • SHA256

      02676081188361295141c03569f240e5f023f55f0b01b425f1efa3c1e6f3dbe6

    • SHA512

      fb44b3b716c4a36051fd12bcf56ac54114c37c2226e256fbd1c6d607a652c26dedc475c17654397305e39f6c7a0c077d931415ada13d8bd7c8e3365aaf6b5b7f

    • SSDEEP

      196608:QM7VFRCmhBnv5ftwg8HDzraLEU2DaDCDU5:BVFRTnv5Vwg8X+B2u2A5

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks