General

  • Target

    com.baniiz.kedra.apk

  • Size

    8.1MB

  • Sample

    241110-sf3g5asmak

  • MD5

    768c88c562e1c1c470811022f63084a6

  • SHA1

    5899f34d5b3410215156a395f3431054a62d5821

  • SHA256

    462c44e0dbd9b95cf3d33e284b72be2dbec175a174a5985b882d88614de50ad7

  • SHA512

    eb90abb038bfa330716f059829b89512e0f66a0a5400cd22e110e44df8f09949f72875f5ffe4e8e79b3b94dfff7a6db2c6328f05a958ab0cca18ab726dbc32a0

  • SSDEEP

    196608:Rl7z27o8h4otkBA4x2g8dxzhaLE++DGDeDgRi:Rlu084o4x2g8vIn+6y8I

Malware Config

Targets

    • Target

      com.baniiz.kedra.apk

    • Size

      8.1MB

    • MD5

      768c88c562e1c1c470811022f63084a6

    • SHA1

      5899f34d5b3410215156a395f3431054a62d5821

    • SHA256

      462c44e0dbd9b95cf3d33e284b72be2dbec175a174a5985b882d88614de50ad7

    • SHA512

      eb90abb038bfa330716f059829b89512e0f66a0a5400cd22e110e44df8f09949f72875f5ffe4e8e79b3b94dfff7a6db2c6328f05a958ab0cca18ab726dbc32a0

    • SSDEEP

      196608:Rl7z27o8h4otkBA4x2g8dxzhaLE++DGDeDgRi:Rlu084o4x2g8vIn+6y8I

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Launchs application uninstaller.

    • Makes a phone call.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

MITRE ATT&CK Mobile v15

Tasks