General

  • Target

    08413fa810ee812ae53ae07a4c96f015c35f0035401e2912b6390b0cd1e1451d.bin

  • Size

    8.5MB

  • Sample

    250219-mdpwcsypct

  • MD5

    32afeb8a25bd43d01bc142df28ead886

  • SHA1

    06ef65f5aad1182b717ea026d3c96bf7f037db56

  • SHA256

    08413fa810ee812ae53ae07a4c96f015c35f0035401e2912b6390b0cd1e1451d

  • SHA512

    ac4176bcf8ab86eba7b1deb863930eb3ce20a5e37310edb130c4b6806946afced6f47875239dc6af4cc626b53e96d35889f82adf405bd90b51c5284589146c54

  • SSDEEP

    196608:nMK8WOAgTCIhgWHhm7e6xjddnbVoy8GJe5sHMbAk/98URWq9mWCUY:IAgTCIFc9B7VoyZE5sonXRWzWCUY

Malware Config

Targets

    • Target

      08413fa810ee812ae53ae07a4c96f015c35f0035401e2912b6390b0cd1e1451d.bin

    • Size

      8.5MB

    • MD5

      32afeb8a25bd43d01bc142df28ead886

    • SHA1

      06ef65f5aad1182b717ea026d3c96bf7f037db56

    • SHA256

      08413fa810ee812ae53ae07a4c96f015c35f0035401e2912b6390b0cd1e1451d

    • SHA512

      ac4176bcf8ab86eba7b1deb863930eb3ce20a5e37310edb130c4b6806946afced6f47875239dc6af4cc626b53e96d35889f82adf405bd90b51c5284589146c54

    • SSDEEP

      196608:nMK8WOAgTCIhgWHhm7e6xjddnbVoy8GJe5sHMbAk/98URWq9mWCUY:IAgTCIFc9B7VoyZE5sonXRWzWCUY

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Queries the mobile country code (MCC)

    • Target

      wubiyejene

    • Size

      8.4MB

    • MD5

      2506cc9d86fcb5134b8e802ded35ce12

    • SHA1

      f3bb5f72614b8823390806b4e641abd662aa77b6

    • SHA256

      3199161e3a2181440f899387c3d707ae99b9fbc4893036ee464de3418a3235d5

    • SHA512

      61430916be1f2f69143004e7f124bca01bcf63233dd7978c7f91d4f3eee8208d709a2d004252015eb048147f754a71e57cf62c425eaa7ddb171fec04faaccfab

    • SSDEEP

      98304:qro/Kr0m36uPp7qEdIji0IkjTxpBEOf+PL6CvHMEbs7o87Wji+2ieSyeTgnrSsKU:636uPpWEdXFkpf5gbsx3WGpYErSsKPwh

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the content of the SMS messages.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests uninstalling the application.

MITRE ATT&CK Mobile v15

Tasks