General

  • Target

    base_113.apk

  • Size

    53.0MB

  • Sample

    250101-mh85ssskdx

  • MD5

    85ed51b00887d331b476f9568222743c

  • SHA1

    fba6938bd6a675b21b4d77d49a58e7fc0b8f9e4d

  • SHA256

    769840a979ee956291e924d5cb95061f424adc3221b26d85e0e8e7f65777decf

  • SHA512

    e097b553c7682849580c0841f89e7141f92a1c2c6e6252496c3e61f504c1e7522953ffb9a61cb129f14100e4e6d39433f7a2c21a3596029422b1c5d27a6c962a

  • SSDEEP

    786432:phP09KrszNOTCzZSs1LllhySA2yFy5msUonUdnp5ZxQ56OcpvcZbE33bHeVjKek7:f09Kgzacht85sXU0DcpvkEnoYcxiJ

Malware Config

Extracted

Family

axbanker

C2

https://manifest-device-657-default-rtdb.firebaseio.com

https://manifest-device-657.firebaseio.com

Extracted

Family

axbanker

C2

https://manifest-device-657-default-rtdb.firebaseio.com

https://manifest-device-657.firebaseio.com

Targets

    • Target

      base_113.apk

    • Size

      53.0MB

    • MD5

      85ed51b00887d331b476f9568222743c

    • SHA1

      fba6938bd6a675b21b4d77d49a58e7fc0b8f9e4d

    • SHA256

      769840a979ee956291e924d5cb95061f424adc3221b26d85e0e8e7f65777decf

    • SHA512

      e097b553c7682849580c0841f89e7141f92a1c2c6e6252496c3e61f504c1e7522953ffb9a61cb129f14100e4e6d39433f7a2c21a3596029422b1c5d27a6c962a

    • SSDEEP

      786432:phP09KrszNOTCzZSs1LllhySA2yFy5msUonUdnp5ZxQ56OcpvcZbE33bHeVjKek7:f09Kgzacht85sXU0DcpvkEnoYcxiJ

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks