Resubmissions

21/12/2024, 23:02

241221-21ca4ssqhy 10

20/12/2024, 07:27

241220-jalsratphm 10

General

  • Target

    8919f2c84bccb75b94393010ea857a4d28754354cbaf7043f49d47ff89318f7c.apk

  • Size

    7.1MB

  • Sample

    241221-21ca4ssqhy

  • MD5

    2ee1c7272b7efc3155f00066226643c2

  • SHA1

    86fcca0d8e4778ce3bbda033dbb8e6ae1558b5e1

  • SHA256

    8919f2c84bccb75b94393010ea857a4d28754354cbaf7043f49d47ff89318f7c

  • SHA512

    b6ba882ee7cfd1735779d9438c0c3d0660d726a1e0ec8f392dbe316f162efe3b5bfb06a9caa866624df988cfd9c91ad1c2f3cac8a51dc6edb51c4a9cfd72e128

  • SSDEEP

    196608:RUITvGePB7u5D6jc/WT9ZfGmw1Inj4KB8c8akpPq2s:5TvVkDD/KGmhZB8ekVq2s

Malware Config

Targets

    • Target

      8919f2c84bccb75b94393010ea857a4d28754354cbaf7043f49d47ff89318f7c.apk

    • Size

      7.1MB

    • MD5

      2ee1c7272b7efc3155f00066226643c2

    • SHA1

      86fcca0d8e4778ce3bbda033dbb8e6ae1558b5e1

    • SHA256

      8919f2c84bccb75b94393010ea857a4d28754354cbaf7043f49d47ff89318f7c

    • SHA512

      b6ba882ee7cfd1735779d9438c0c3d0660d726a1e0ec8f392dbe316f162efe3b5bfb06a9caa866624df988cfd9c91ad1c2f3cac8a51dc6edb51c4a9cfd72e128

    • SSDEEP

      196608:RUITvGePB7u5D6jc/WT9ZfGmw1Inj4KB8c8akpPq2s:5TvVkDD/KGmhZB8ekVq2s

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Queries the mobile country code (MCC)

    • Requests allowing to install additional applications from unknown sources.

    • Target

      bayadoje

    • Size

      7.6MB

    • MD5

      baf3c550534acd7dce3795cb7176d738

    • SHA1

      2f99a11bedeaa8357b75414e0797d8cfb337aa7d

    • SHA256

      129240b79c82258e10643b16f0947b2ccbb88e6fea642176a85f8d21d94a2ab6

    • SHA512

      c3180ee141d9080aa97c38936dfb9bb164a8151912f2b9594275566eb8f107dfbd8bd167e8e2472a7a53562f34b5f3be88ccc501efe37ae404c4b8ddfa346f34

    • SSDEEP

      98304:so/Krg4JmdxU1g9hZB0/HRCQoR9cKzqtKsRm2ieSyeTgnrSs2a+5nWKCYFWY:sJmdxU1IN0J6zqNBYErSs2a+xH

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

    • Requests uninstalling the application.

MITRE ATT&CK Mobile v15

Tasks