General

  • Target

    0fe3c7f51cab609170268a50284603515369769c0023cc9d493859406d56f9e5.bin

  • Size

    2.4MB

  • Sample

    250304-1y43nsstcy

  • MD5

    1c313891a89889a9afe9743fc5c80b10

  • SHA1

    e544b7c518ceb796f7a4570fb17b118f4fccb5f7

  • SHA256

    0fe3c7f51cab609170268a50284603515369769c0023cc9d493859406d56f9e5

  • SHA512

    769633f442182a714d1d290251843a06b0841b2c37e7a705b0a673fcf4ce949b4f45faf993cead676f70e882f6ddfdf5e1b857b66254b71225c431876b40a228

  • SSDEEP

    49152:c05cft+H8jZQO8UuQRZpdlq26HtHkrylbQlDaf5rMRCIVEjU:OAcjZ84q/tHkK6Ofe5VEjU

Malware Config

Extracted

Family

xenomorph

C2

simpleyo5.tk

simpleyo5.cf

kart12sec.ga

kart12sec.gq

Extracted

Family

xenomorph

AES_key
AES_key

Targets

    • Target

      0fe3c7f51cab609170268a50284603515369769c0023cc9d493859406d56f9e5.bin

    • Size

      2.4MB

    • MD5

      1c313891a89889a9afe9743fc5c80b10

    • SHA1

      e544b7c518ceb796f7a4570fb17b118f4fccb5f7

    • SHA256

      0fe3c7f51cab609170268a50284603515369769c0023cc9d493859406d56f9e5

    • SHA512

      769633f442182a714d1d290251843a06b0841b2c37e7a705b0a673fcf4ce949b4f45faf993cead676f70e882f6ddfdf5e1b857b66254b71225c431876b40a228

    • SSDEEP

      49152:c05cft+H8jZQO8UuQRZpdlq26HtHkrylbQlDaf5rMRCIVEjU:OAcjZ84q/tHkK6Ofe5VEjU

    • Xenomorph

      Xenomorph is an Android banking trojan that is seemingly tied with AlienBot.

    • Xenomorph family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Reads the content of SMS inbox messages.

    • Reads the content of outgoing SMS messages.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks