General

  • Target

    3603f04cce819ccf8e78756712e92743707a8c902093b1ffd2719bfafdbf22e1.bin

  • Size

    1.8MB

  • Sample

    250314-1zbgratkw2

  • MD5

    a4aa8da3c6054d73b9ffcfa2fd3bb16f

  • SHA1

    6be81f1cd9442c53d01d5255798a0577d709f1a0

  • SHA256

    3603f04cce819ccf8e78756712e92743707a8c902093b1ffd2719bfafdbf22e1

  • SHA512

    7fca0119be5d4286e9b6630053da6470e78d280609bf2a5d3ad18236a21abdcc898b8666ed1326e6726d2a6f59b1bdc1d6b99f423077a65245ce270ab3a85957

  • SSDEEP

    24576:pOY1iFoQstAKwR4afKfqufHb111Z1jRWjOkaQnx6AjpjjYHlV8DdtOjUSrVa1gOu:pOY1xkvbu/D1Z1NRQx6ApKQDdwZqo

Malware Config

Extracted

Family

ajina

C2

46.226.160.19:8080

Attributes
  • target_apps

    air.com.ssdsoftwaresolutions.clickuz

    am.easypay.easywallet

    am.imwallet.android

    am.mts.mobidram

    am.upay.android

    app.ab.banking

    arca.am.arca

    az.anipay.usermbanking

    az.cib.app

    az.epul.technopay.android

    az.portmanat.app

    az.portmanat.newapp

    az.pulpal

    az.tezpay.app

    com.binance.dev

    com.eg.android.AlipayGphone

    com.fastshift.wallet

    com.haypost.haypost_mobile

    com.intervale.baitushum

    com.ipc_app

    com.kp.kompanion

    com.kp.megapay.kg

    com.m10

    com.maanavan.mb_kyrgyzstan

    com.mbf.fsclient_android

    com.moneybookers.skrillpayments

    com.ofss.digx.mobile.android.allied

    com.olsoft.mats.prod

    com.pyypl

    com.safaroff.million_android

Targets

MITRE ATT&CK Mobile v15

Tasks