General
-
Target
57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2.bin
-
Size
2.0MB
-
Sample
250324-16ykvszrx8
-
MD5
866cdf7f625325a5023d969ea5475688
-
SHA1
8525189d36bd4cda0b431c92a8823611bd6ba6b8
-
SHA256
57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2
-
SHA512
58697a6b2c736e8fe68e0f4cfd49233cd3c26cf3672389dfa17ee8f6c4fa83d6560391bc0cdcc73de7e075749701b9f5ae6e16b41baeff43eb44f6d220cb97d9
-
SSDEEP
49152:h1sR4zAw32B9qlKpvv9/878wRucW6SMN8o9j2qwpI:ER48/2o9/8IwRPW6SsNcI
Behavioral task
behavioral1
Sample
57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
axbanker
https://report-f280e-default-rtdb.firebaseio.com
Targets
-
-
Target
57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2.bin
-
Size
2.0MB
-
MD5
866cdf7f625325a5023d969ea5475688
-
SHA1
8525189d36bd4cda0b431c92a8823611bd6ba6b8
-
SHA256
57c9c3f9a8ebd64c4e1932c1149802f48f2734c0d202b3d3431bb5ce2910c1f2
-
SHA512
58697a6b2c736e8fe68e0f4cfd49233cd3c26cf3672389dfa17ee8f6c4fa83d6560391bc0cdcc73de7e075749701b9f5ae6e16b41baeff43eb44f6d220cb97d9
-
SSDEEP
49152:h1sR4zAw32B9qlKpvv9/878wRucW6SMN8o9j2qwpI:ER48/2o9/8IwRPW6SsNcI
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-