General
-
Target
rex.apk
-
Size
7.8MB
-
Sample
250327-mq2exssqt4
-
MD5
5e6c199096fb378865454af7fe158a38
-
SHA1
9be62d38f7fdf15f2841c442f57e74768bb9c264
-
SHA256
12b59f6d4c21c1b4ca25dab0618ed5ffb57ad8f9c7ba7b731ea0f8b2aac251cc
-
SHA512
2c93b6faa6f6fafe786f7ba6236ed8648a3fc599c6e6c72921633195649daafc41eac05aa3a019e84a1863e054ea28c87b06635b2cfc92f5e8f784ae2ab2c67a
-
SSDEEP
196608:8cNnc/cvcDPpG1cscgA0TIrsE+5zFKKpEC6iOchpWy0e:1Nc0EDhGKFgA0krs7T9CLe
Static task
static1
Behavioral task
behavioral1
Sample
rex.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
rex.apk
-
Size
7.8MB
-
MD5
5e6c199096fb378865454af7fe158a38
-
SHA1
9be62d38f7fdf15f2841c442f57e74768bb9c264
-
SHA256
12b59f6d4c21c1b4ca25dab0618ed5ffb57ad8f9c7ba7b731ea0f8b2aac251cc
-
SHA512
2c93b6faa6f6fafe786f7ba6236ed8648a3fc599c6e6c72921633195649daafc41eac05aa3a019e84a1863e054ea28c87b06635b2cfc92f5e8f784ae2ab2c67a
-
SSDEEP
196608:8cNnc/cvcDPpG1cscgA0TIrsE+5zFKKpEC6iOchpWy0e:1Nc0EDhGKFgA0krs7T9CLe
-
Copybara
Copybara is an Android banking trojan first seen in November 2021.
-
Copybara family
-
Copybara payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1