Resubmissions

14/11/2024, 14:23

241114-rqe9xatqcl 7

14/11/2024, 14:18

241114-rmnf4szmay 7

General

  • Target

    indus.credit.card.apk

  • Size

    29.8MB

  • Sample

    241114-rqe9xatqcl

  • MD5

    1f97c50d27a55b9f5b25186e5509d031

  • SHA1

    3bafad160e86af9fa619db169950c439021f5902

  • SHA256

    0f5568d9ea1197e88b22d042d9d2b39c505ba062c63bf74b909cef8041c97086

  • SHA512

    2663b070ec25f95096c78cad25b9f8c889297817085fb101bbbaca7d1710e3046d4d81fd0a8e31d6db782139e248d73bb9b9d04952fbce6b397f4026ab99e539

  • SSDEEP

    786432:ZWT5dT80ULSJ07Ib2gsc5Q9ReO3Tddh6norjQ/9b23V:ZWT7AuEIPl8eO5T/Q/9b6

Malware Config

Targets

    • Target

      indus.credit.card.apk

    • Size

      29.8MB

    • MD5

      1f97c50d27a55b9f5b25186e5509d031

    • SHA1

      3bafad160e86af9fa619db169950c439021f5902

    • SHA256

      0f5568d9ea1197e88b22d042d9d2b39c505ba062c63bf74b909cef8041c97086

    • SHA512

      2663b070ec25f95096c78cad25b9f8c889297817085fb101bbbaca7d1710e3046d4d81fd0a8e31d6db782139e248d73bb9b9d04952fbce6b397f4026ab99e539

    • SSDEEP

      786432:ZWT5dT80ULSJ07Ib2gsc5Q9ReO3Tddh6norjQ/9b23V:ZWT7AuEIPl8eO5T/Q/9b6

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the content of the SMS messages.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks