General

  • Target

    BURLADOR NEXT.apk

  • Size

    4.4MB

  • Sample

    250205-qqlw1szlgk

  • MD5

    9eb8fa5f616971557256bad7574c5f14

  • SHA1

    963742c9ebc25275a47a2bfcf8a61b9148cdd4bd

  • SHA256

    70cb4f240a1f4da74ba181bd27df253dd07098db8b0941092f68359256f62909

  • SHA512

    70787e3da18072157dad1ee72da2489027097b01e920332110e345d5ad466f46dfc5e9597a4188301a9f73505f735e1f6368dfcb6098280a9baf7c7afeccec04

  • SSDEEP

    98304:bqRTCU8hWKNq3XwYOcmyzFK5ro+mz/zB2Tt0tQIkJRY:uqsKwAtyGroZzwiuO

Malware Config

Targets

    • Target

      BURLADOR NEXT.apk

    • Size

      4.4MB

    • MD5

      9eb8fa5f616971557256bad7574c5f14

    • SHA1

      963742c9ebc25275a47a2bfcf8a61b9148cdd4bd

    • SHA256

      70cb4f240a1f4da74ba181bd27df253dd07098db8b0941092f68359256f62909

    • SHA512

      70787e3da18072157dad1ee72da2489027097b01e920332110e345d5ad466f46dfc5e9597a4188301a9f73505f735e1f6368dfcb6098280a9baf7c7afeccec04

    • SSDEEP

      98304:bqRTCU8hWKNq3XwYOcmyzFK5ro+mz/zB2Tt0tQIkJRY:uqsKwAtyGroZzwiuO

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Legitimate hosting services abused for malware hosting/C2

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks