General

  • Target

    Install-Pro.apk

  • Size

    9.5MB

  • Sample

    250128-sb5rpavpan

  • MD5

    7b861c06f50ac186bb2f6e3c770766b2

  • SHA1

    3f458513ee69e7c6ab0e04b6350d73aa4ba4496f

  • SHA256

    7643d4c23f374700d06e4ac708c3e6238a401470610e824130bb179735ea99a5

  • SHA512

    e694573aa164145df45accd52dd147336be8ad63ff6074892cd8716393900a0b410dd2768218ff11ce1406c5516f171455b51c53664d85ef455fcf0e336db3a0

  • SSDEEP

    196608:e0hmHTYaWN6VZ6GrepTSqud3HvdBUGKWcA6RCeYbaatEHCwpaAk0V8:v0TYbN6LKpBu5Hv0DWARCbRsCdBB

Malware Config

Targets

    • Target

      Install-Pro.apk

    • Size

      9.5MB

    • MD5

      7b861c06f50ac186bb2f6e3c770766b2

    • SHA1

      3f458513ee69e7c6ab0e04b6350d73aa4ba4496f

    • SHA256

      7643d4c23f374700d06e4ac708c3e6238a401470610e824130bb179735ea99a5

    • SHA512

      e694573aa164145df45accd52dd147336be8ad63ff6074892cd8716393900a0b410dd2768218ff11ce1406c5516f171455b51c53664d85ef455fcf0e336db3a0

    • SSDEEP

      196608:e0hmHTYaWN6VZ6GrepTSqud3HvdBUGKWcA6RCeYbaatEHCwpaAk0V8:v0TYbN6LKpBu5Hv0DWARCbRsCdBB

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Queries the mobile country code (MCC)

    • Target

      cidugiwopu

    • Size

      7.5MB

    • MD5

      f1a79a60e42064905ed8f2946df68864

    • SHA1

      0b92d6beb4576883c800e9a08d8844dbf506fa07

    • SHA256

      813b9d8291088664b2dcdc41ca6cd6ac197b55f8a5e9cd5c17e3258b4be2f154

    • SHA512

      0da1bb6035bf79e43fc3988088f06ca41c29b29c227c07492ec0a401f0349517ccc99a2e3769f3f2e5aed831ffeaf2c927745e26848fc30ce7e9ff911aa3753a

    • SSDEEP

      98304:qo/Kr4msIbbyHB7TJWnt7brES1V6i2ieSyeTgnrSstv9qmkF495Q7x:qsIbbyH9TJWntfDslYErSsF9qm9e7x

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests uninstalling the application.

MITRE ATT&CK Mobile v15

Tasks