General

  • Target

    daba8cfd789d0a69c20cef14115fed2206a2042c84b9e96cdb5a38fa915cd305.apk

  • Size

    9.2MB

  • Sample

    250124-j835pazqbl

  • MD5

    df6950fb69837d6c932058b5b7965dfb

  • SHA1

    99200b9f365acb2196ed44e239cd7f201106eb45

  • SHA256

    daba8cfd789d0a69c20cef14115fed2206a2042c84b9e96cdb5a38fa915cd305

  • SHA512

    9bbacf73e40fc15dd2a39384d43379750a24840690c8111e555430ba9969d92fba02514e23120e8bec99917d7eb57a22da0c08ee6107198e05eb9770e9aab360

  • SSDEEP

    196608:YkRK0T9aE5iOrRl15KHDIwmgGvpejXAUdQ+QDmVAkH1:hK0YEi+LKHDVGReldQHDmVAG

Malware Config

Targets

    • Target

      daba8cfd789d0a69c20cef14115fed2206a2042c84b9e96cdb5a38fa915cd305.apk

    • Size

      9.2MB

    • MD5

      df6950fb69837d6c932058b5b7965dfb

    • SHA1

      99200b9f365acb2196ed44e239cd7f201106eb45

    • SHA256

      daba8cfd789d0a69c20cef14115fed2206a2042c84b9e96cdb5a38fa915cd305

    • SHA512

      9bbacf73e40fc15dd2a39384d43379750a24840690c8111e555430ba9969d92fba02514e23120e8bec99917d7eb57a22da0c08ee6107198e05eb9770e9aab360

    • SSDEEP

      196608:YkRK0T9aE5iOrRl15KHDIwmgGvpejXAUdQ+QDmVAkH1:hK0YEi+LKHDVGReldQHDmVAG

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Queries the mobile country code (MCC)

    • Target

      suniji

    • Size

      9.9MB

    • MD5

      c42fa3877f0f4d6d3d9df649f76bbb3b

    • SHA1

      b00a54807507294dffcaeb6ff6d7c0b5673a0f4c

    • SHA256

      44eda4365a537ac954a43de4617cbef793ecff5672b51cd0ef272c5674c63a26

    • SHA512

      9403a03f574f51bd45d341fe14a96bc260cb7946e838a5495cdcdd75df166594add5716bac5efeb6b9a5556627d62040f9385ddaf52e61091bca591f5857cd5e

    • SSDEEP

      98304:to/Kr4cdb6fC4CuQRmKKuu1/0d5ysPmKgA1Zk4UqQbgRr5ysPmKgAWPbQA9eb16l:Ldb6fC7ueuM6UpDIxBYErSszEyxP

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the content of the SMS messages.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests uninstalling the application.

MITRE ATT&CK Mobile v15

Tasks