General

  • Target

    57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2.bin

  • Size

    2.0MB

  • Sample

    250324-16ykvszrx8

  • MD5

    866cdf7f625325a5023d969ea5475688

  • SHA1

    8525189d36bd4cda0b431c92a8823611bd6ba6b8

  • SHA256

    57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2

  • SHA512

    58697a6b2c736e8fe68e0f4cfd49233cd3c26cf3672389dfa17ee8f6c4fa83d6560391bc0cdcc73de7e075749701b9f5ae6e16b41baeff43eb44f6d220cb97d9

  • SSDEEP

    49152:h1sR4zAw32B9qlKpvv9/878wRucW6SMN8o9j2qwpI:ER48/2o9/8IwRPW6SsNcI

Malware Config

Extracted

Family

axbanker

C2

https://report-f280e-default-rtdb.firebaseio.com

Targets

    • Target

      57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2.bin

    • Size

      2.0MB

    • MD5

      866cdf7f625325a5023d969ea5475688

    • SHA1

      8525189d36bd4cda0b431c92a8823611bd6ba6b8

    • SHA256

      57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2

    • SHA512

      58697a6b2c736e8fe68e0f4cfd49233cd3c26cf3672389dfa17ee8f6c4fa83d6560391bc0cdcc73de7e075749701b9f5ae6e16b41baeff43eb44f6d220cb97d9

    • SSDEEP

      49152:h1sR4zAw32B9qlKpvv9/878wRucW6SMN8o9j2qwpI:ER48/2o9/8IwRPW6SsNcI

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks