General

  • Target

    e70e9e17f4083ab8a8620a9eed08ec1b06b598db1a8d3711992cfd219bf65afb.zip

  • Size

    1.3MB

  • Sample

    250327-sekwpawkz8

  • MD5

    b0fa8413d3de444118fdf0484721d1a9

  • SHA1

    0a84e6293aec49a028519146a976a9cde9255b48

  • SHA256

    e70e9e17f4083ab8a8620a9eed08ec1b06b598db1a8d3711992cfd219bf65afb

  • SHA512

    89afbe5852747dc5cdb63d343b93b4bc6058897b50a5a6b85e85a434a54be577a84f9a8ef8130daa9465f6b2a337d2f1be3753b0d4033bbe22db781f49d2d896

  • SSDEEP

    24576:tsNyTbtadFkVk+7qic8JzoQ8TsrRyXhjv2SOQWZfXExtj:tsNsbs6VNhkOwxjvBWpUxtj

Malware Config

Extracted

Family

aberebot

C2

https://api.telegram.org/bot1962569196:AAHM6U4h6BTtbS762JueoJUyaCXb4dBjeyA/getUpdates?offset=

https://api.telegram.org/bot1962569196:AAHM6U4h6BTtbS762JueoJUyaCXb4dBjeyA/sendMessage?chat_id=-1001612354163&text=

Targets

    • Target

      ee20d6abcf80df3a02c99b977ae6c948d2449f573daa9204ccc9fab6825883f3.apk

    • Size

      1.9MB

    • MD5

      44405c5d83122d34d6d8cd8be926e4ac

    • SHA1

      dfdcc3747ea7c93e289bcf83c341e65de15fca27

    • SHA256

      ee20d6abcf80df3a02c99b977ae6c948d2449f573daa9204ccc9fab6825883f3

    • SHA512

      b3e33d0fe710e8f7fa736f43601ad624826fee2a5dc4c1696e024d71cfe54aa8dce03bb6331a6349a863e63373fbfc3b2b9c426028f554b4b97bcf16257649b6

    • SSDEEP

      49152:C4z7QDP2llZWltfrb6zYAVEOADgWDHfrFSXT:pUMlZUtfDOE3HfrFSXT

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.