General
-
Target
MiSantander.apk
-
Size
4.4MB
-
Sample
241119-lttzksyner
-
MD5
9a11a99079769a42d5783b0ed7a1cf5b
-
SHA1
9fa814cc91a704a2f8aead4f81b1ed0cf1320b29
-
SHA256
9332d590a78e984f9f1a397d558a5b8db11eed428b23abce9e29ef6c30879f90
-
SHA512
9a875cd2956523284907e0d4db2d34dc939bb349909452a1b26838bb9bc7738cc6fb647a9483a880cf3dd302e3d05a65a60a7a136c91f33d0e97ff5e720c9500
-
SSDEEP
98304:S6F3KYvQTy92v6jG2Kx+sAFsD0erD0HD0KD0EpD0nApD0tD0OD0VyN:SUKYdkIG2+AyD9DeDPD7DC0DkDfDQyN
Behavioral task
behavioral1
Sample
MiSantander.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
MiSantander.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
MiSantander.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
MiSantander.apk
-
Size
4.4MB
-
MD5
9a11a99079769a42d5783b0ed7a1cf5b
-
SHA1
9fa814cc91a704a2f8aead4f81b1ed0cf1320b29
-
SHA256
9332d590a78e984f9f1a397d558a5b8db11eed428b23abce9e29ef6c30879f90
-
SHA512
9a875cd2956523284907e0d4db2d34dc939bb349909452a1b26838bb9bc7738cc6fb647a9483a880cf3dd302e3d05a65a60a7a136c91f33d0e97ff5e720c9500
-
SSDEEP
98304:S6F3KYvQTy92v6jG2Kx+sAFsD0erD0HD0KD0EpD0nApD0tD0OD0VyN:SUKYdkIG2+AyD9DeDPD7DC0DkDfDQyN
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1