General

  • Target

    Byond by BSI.apk

  • Size

    48.1MB

  • Sample

    250119-f93zjaxlcz

  • MD5

    4778d46b03b934fa299c99743e22e6fb

  • SHA1

    d7935e10cf7b3bbf36421996b63cf152f7e77b4b

  • SHA256

    f3f968854e615a6b88d972534718a726adbc69e126acd8a916bac4647dc270ab

  • SHA512

    6e2d53ae6491eb6737b3395b8008f0cd8cf3a04afb41f2e5b018e94d3b315304f60115e24c77ec1029304401a973a817b3e6427cacdef42737b9691427ffb573

  • SSDEEP

    786432:WugSqAgGHWyxE15p6ioJc2pQVtX5iCF1kjCXFY8J1qUqqNj1noUesV:W4gbmi6ioy2pgtX5n3Ih8qUH924V

Malware Config

Extracted

Family

axbanker

C2

https://bsi-superapp-prod-c6992-default-rtdb.firebaseio.com

Targets

    • Target

      Byond by BSI.apk

    • Size

      48.1MB

    • MD5

      4778d46b03b934fa299c99743e22e6fb

    • SHA1

      d7935e10cf7b3bbf36421996b63cf152f7e77b4b

    • SHA256

      f3f968854e615a6b88d972534718a726adbc69e126acd8a916bac4647dc270ab

    • SHA512

      6e2d53ae6491eb6737b3395b8008f0cd8cf3a04afb41f2e5b018e94d3b315304f60115e24c77ec1029304401a973a817b3e6427cacdef42737b9691427ffb573

    • SSDEEP

      786432:WugSqAgGHWyxE15p6ioJc2pQVtX5iCF1kjCXFY8J1qUqqNj1noUesV:W4gbmi6ioy2pgtX5n3Ih8qUH924V

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks