Resubmissions

09-12-2024 20:58

241209-zsbcqs1lc1 10

16-11-2024 22:02

241116-1x4eraynep 10

General

  • Target

    db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000.bin

  • Size

    4.8MB

  • Sample

    241116-1x4eraynep

  • MD5

    d3da3e52be0eb1ce46533f7e36f50e1c

  • SHA1

    fc58ac245d61664428727ab4afbad68b7b86b0e7

  • SHA256

    db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000

  • SHA512

    0ad81172b5b3aacfb13855fa3f300f939e7480a1857337e76dcc2d68ddf8eee563d6c817f7cea42a8cf4c107fc7d6a4699969789100764549fbba54b0dccffb5

  • SSDEEP

    98304:O6PRNrPJ44RsVRdxaKgBemDx2+Po2DEN7Y06c9VreJ5L+UfVoMz0KpLpj:DRN7JDCRHabJQeo2mY29Ne/CUic

Malware Config

Extracted

Family

nexus

C2

http://109.206.243.54

http://109.206.243.55

Targets

    • Target

      db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000.bin

    • Size

      4.8MB

    • MD5

      d3da3e52be0eb1ce46533f7e36f50e1c

    • SHA1

      fc58ac245d61664428727ab4afbad68b7b86b0e7

    • SHA256

      db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000

    • SHA512

      0ad81172b5b3aacfb13855fa3f300f939e7480a1857337e76dcc2d68ddf8eee563d6c817f7cea42a8cf4c107fc7d6a4699969789100764549fbba54b0dccffb5

    • SSDEEP

      98304:O6PRNrPJ44RsVRdxaKgBemDx2+Po2DEN7Y06c9VreJ5L+UfVoMz0KpLpj:DRN7JDCRHabJQeo2mY29Ne/CUic

    • Nexus

      Nexus is an Android banking trojan related to the SOVA banking trojan.

    • Nexus family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks