General

  • Target

    e70e9e17f4083ab8a8620a9eed08ec1b06b598db1a8d3711992cfd219bf65afb.zip

  • Size

    1.3MB

  • Sample

    250327-scg21swkx3

  • MD5

    b0fa8413d3de444118fdf0484721d1a9

  • SHA1

    0a84e6293aec49a028519146a976a9cde9255b48

  • SHA256

    e70e9e17f4083ab8a8620a9eed08ec1b06b598db1a8d3711992cfd219bf65afb

  • SHA512

    89afbe5852747dc5cdb63d343b93b4bc6058897b50a5a6b85e85a434a54be577a84f9a8ef8130daa9465f6b2a337d2f1be3753b0d4033bbe22db781f49d2d896

  • SSDEEP

    24576:tsNyTbtadFkVk+7qic8JzoQ8TsrRyXhjv2SOQWZfXExtj:tsNsbs6VNhkOwxjvBWpUxtj

Malware Config

Extracted

Family

aberebot

C2

https://api.telegram.org/bot1962569196:AAHM6U4h6BTtbS762JueoJUyaCXb4dBjeyA/getUpdates?offset=

https://api.telegram.org/bot1962569196:AAHM6U4h6BTtbS762JueoJUyaCXb4dBjeyA/sendMessage?chat_id=-1001612354163&text=

Targets

    • Target

      ee20d6abcf80df3a02c99b977ae6c948d2449f573daa9204ccc9fab6825883f3.apk

    • Size

      1.9MB

    • MD5

      44405c5d83122d34d6d8cd8be926e4ac

    • SHA1

      dfdcc3747ea7c93e289bcf83c341e65de15fca27

    • SHA256

      ee20d6abcf80df3a02c99b977ae6c948d2449f573daa9204ccc9fab6825883f3

    • SHA512

      b3e33d0fe710e8f7fa736f43601ad624826fee2a5dc4c1696e024d71cfe54aa8dce03bb6331a6349a863e63373fbfc3b2b9c426028f554b4b97bcf16257649b6

    • SSDEEP

      49152:C4z7QDP2llZWltfrb6zYAVEOADgWDHfrFSXT:pUMlZUtfDOE3HfrFSXT

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks