General

  • Target

    dc0fd48deff9420b8719f31538925fc709bd3e4a98c4cb27729329c01e97882f.zip

  • Size

    3.4MB

  • Sample

    250327-pg2enstnt2

  • MD5

    137fceef6afbc154c1e8cfd543d006ba

  • SHA1

    5b47afeec97644ee26548a755423a3bcd85ffecd

  • SHA256

    dc0fd48deff9420b8719f31538925fc709bd3e4a98c4cb27729329c01e97882f

  • SHA512

    5722461abe959c2990edabb6e7fbec8c4a47b7804d4386f85257ef5075c65d93747ba9a3ba5f22f59eca4822d9bcb8757af22069b66d793762d3bcdea352a561

  • SSDEEP

    98304:YjH6b621XSFA+p0wKuobjTtxWC4d0uwAUy:YaUA+p07uioum7

Malware Config

Extracted

Family

oscorp

Botnet

1232XFKQTU

AES_key
AES_key

Targets

    • Target

      486d6a713d8c907df70a919729ac685328ab91a8977c2e352165640c4bd4d507.apk

    • Size

      3.7MB

    • MD5

      cee4b1fae8a45502d106a200593a9125

    • SHA1

      627ef79b459b7e4c001ec298e7fae9f82f16fc97

    • SHA256

      486d6a713d8c907df70a919729ac685328ab91a8977c2e352165640c4bd4d507

    • SHA512

      8ce3d4580af1855f39bc4714490731ff4414b0d425dacfc64055b1fd0618495149d148fdcdcfab66c47542d63ab0c7af80a056a8f3faf506b5e0899526bd8087

    • SSDEEP

      98304:S6YFtCZdYrO7+d00Vs18LnORE/TRZWT1wS/j3uoz:S6QCzYrOw00ayTPLTWT/5

    • Oscorp

      Oscorp is an Android stealer that targets multiple financial information first seen in Feb 2021.

    • Oscorp family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks