General

  • Target

    HotSexGame.apk

  • Size

    9.4MB

  • Sample

    250126-nfx57azmgt

  • MD5

    24f5c73f3b6b11a16b8f3baec8b31cd2

  • SHA1

    b661d37d7b0158496358110f398c9f0b0cfff038

  • SHA256

    84b94edbf79d057dbbdc9f8c009d5d175464f0a069bf4c1e9df1b07cc245d15a

  • SHA512

    a813f7fc59a14cf9cd6b5d03e85b1bc0a892cf4417a8590e581113377aeae94a73bb015d90ed48d488b34f1efac197b56410fdff1514643480076cad438ff0d5

  • SSDEEP

    196608:C4ok0P0wxlIF7TSyxxOHKNx3ajHE9Jig4RQ+KT46a2P:1TL9VOq3nig4R2T4Q

Malware Config

Targets

    • Target

      HotSexGame.apk

    • Size

      9.4MB

    • MD5

      24f5c73f3b6b11a16b8f3baec8b31cd2

    • SHA1

      b661d37d7b0158496358110f398c9f0b0cfff038

    • SHA256

      84b94edbf79d057dbbdc9f8c009d5d175464f0a069bf4c1e9df1b07cc245d15a

    • SHA512

      a813f7fc59a14cf9cd6b5d03e85b1bc0a892cf4417a8590e581113377aeae94a73bb015d90ed48d488b34f1efac197b56410fdff1514643480076cad438ff0d5

    • SSDEEP

      196608:C4ok0P0wxlIF7TSyxxOHKNx3ajHE9Jig4RQ+KT46a2P:1TL9VOq3nig4R2T4Q

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Requests allowing to install additional applications from unknown sources.

MITRE ATT&CK Mobile v15

Tasks