General

  • Target

    09018457e7366d2b54ae1ce19ad5ea61ac0f58464d6858c41b358f0a37cf3233

  • Size

    8.1MB

  • Sample

    250322-arnh8sxqs8

  • MD5

    ce089137681025986be62b70339bbacd

  • SHA1

    e81dc0f6b2df641c3d58e54c77a20438fb14b24c

  • SHA256

    09018457e7366d2b54ae1ce19ad5ea61ac0f58464d6858c41b358f0a37cf3233

  • SHA512

    3cfd5642eb535fe7148c073d6d67b62f0afbd043f1d00508495816c84645c7fd29393113d0384737f148ade65fa1ea00683b8698ae46ad8b4cfe6c9aa5bb0240

  • SSDEEP

    196608:tp8YoZUkjZlU5u8ZLpqIFuAn3oE3TUbHcSjIsGscvdX:/oZTFA3dbu0ZUYUrBa

Malware Config

Targets

    • Target

      09018457e7366d2b54ae1ce19ad5ea61ac0f58464d6858c41b358f0a37cf3233

    • Size

      8.1MB

    • MD5

      ce089137681025986be62b70339bbacd

    • SHA1

      e81dc0f6b2df641c3d58e54c77a20438fb14b24c

    • SHA256

      09018457e7366d2b54ae1ce19ad5ea61ac0f58464d6858c41b358f0a37cf3233

    • SHA512

      3cfd5642eb535fe7148c073d6d67b62f0afbd043f1d00508495816c84645c7fd29393113d0384737f148ade65fa1ea00683b8698ae46ad8b4cfe6c9aa5bb0240

    • SSDEEP

      196608:tp8YoZUkjZlU5u8ZLpqIFuAn3oE3TUbHcSjIsGscvdX:/oZTFA3dbu0ZUYUrBa

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Checks the application is allowed to request package installs through the package installer

      Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).

    • Queries the mobile country code (MCC)

    • Target

      risezikixo

    • Size

      7.6MB

    • MD5

      4a4754d54b066ec39f69a8c4d5f6684b

    • SHA1

      6f12b8f89943ad99c1a7fd872070b28a44783d6e

    • SHA256

      aba358b9c43696eb01fd4ad64db6d55b2e3bf192a05e8a2b658fc43e0d74c2e1

    • SHA512

      6d17d8ffc9c9a20a73739ae5c967ef4644c1e314f8952ee5234de38cae9495ea7f6d9caebc770ddbf3a86c6179fca69891606ef5cf7709ee89e41cea269ba7b8

    • SSDEEP

      98304:SlO3ZBo9NyKP90roRSIC2zf2xCjtP2pLfqH7k3Gqh3BQJgozGaLBP6xwPC5s4Quq:xmmDC1Lk3GqhxQ6Lt2yaLWZdsa+

    • Antidot

      Antidot is an Android banking trojan first seen in May 2024.

    • Antidot family

    • Antidot payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks