General

  • Target

    Install Pro.apk

  • Size

    8.0MB

  • Sample

    250124-thxkbswmgx

  • MD5

    fa02951bd5e0f0a662cf739b84a99ec3

  • SHA1

    7b172ae5f07b9c4e2b896a454d89fe46704ddab8

  • SHA256

    9e010345c827e0b37ca14b42f371c0fc1a98d1d5f94015df3c0105a6e0a1d787

  • SHA512

    9a99f6692f814f83becff95f797264f19ebd862b1c4b2481b65515bc9fe440b45f6f1fc6056a2906cd06e8f795f0c61daaa4333584d2735fb72c0790b34453ac

  • SSDEEP

    196608:bYL5S4NfXGhTuZFlICl/JISinxlrzuFF+QIklWwp:MSI2duZfTTISQFTqlWk

Malware Config

Targets

    • Target

      Install Pro.apk

    • Size

      8.0MB

    • MD5

      fa02951bd5e0f0a662cf739b84a99ec3

    • SHA1

      7b172ae5f07b9c4e2b896a454d89fe46704ddab8

    • SHA256

      9e010345c827e0b37ca14b42f371c0fc1a98d1d5f94015df3c0105a6e0a1d787

    • SHA512

      9a99f6692f814f83becff95f797264f19ebd862b1c4b2481b65515bc9fe440b45f6f1fc6056a2906cd06e8f795f0c61daaa4333584d2735fb72c0790b34453ac

    • SSDEEP

      196608:bYL5S4NfXGhTuZFlICl/JISinxlrzuFF+QIklWwp:MSI2duZfTTISQFTqlWk

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Queries the mobile country code (MCC)

    • Target

      kovobopipe

    • Size

      8.7MB

    • MD5

      02af81325aaddd54feb7f0e8fc84ee7b

    • SHA1

      3161e43ca8dd405de2df79eb03edc601b52a7ec4

    • SHA256

      e8bad4b9a036d34bd196b09ad1ed225a94b46e6b7d41ccd250281208ed87b040

    • SHA512

      8f194cae88c8759545bc1456166478e66b5f23492652088de9504b6b2612e4d0227e1133f7a21cd8301a158b80718a32206c86ab120de10a80bd680f6f74c807

    • SSDEEP

      98304:so/Kr2VeTADQyKmLqUoDp3j8qkG07zjaY5YZBPxeV2BUsCYsTh2ieSyeTgnrSs+:BeTADQX0at80vZMPfn0YErSs+

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

    • Requests uninstalling the application.

MITRE ATT&CK Mobile v15

Tasks