Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
04/04/2025, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
Update.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
Update.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
Update.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
vibufagafa.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
vibufagafa.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
vibufagafa.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
Update.apk
-
Size
17.1MB
-
MD5
d44caa02e4fa7e2992b327abb4242791
-
SHA1
2ec56ee9ad5fe44a3407ff977c6d0b5dfe4704e6
-
SHA256
3de709dadce6084258b4928145e5da404affeeedad19426f93a2741d6fd6dcf4
-
SHA512
46b0c1d1a118bbfe621a1f95d2186259db9f3d458adbfdd07686961559d88b37252b1d71fdd4d9aad6e6f6e2b120c906fd52dc04612ae6e1de17fe9d356af57a
-
SSDEEP
393216:n/6/FU/4HPKDDeXtn7rqqn8W41YRdcz27+rDrfn7S3Zd:n/6924yDiXZr18W41YRvwDrfmZd
Malware Config
Signatures
-
Antidot
Antidot is an Android banking trojan first seen in May 2024.
-
Antidot family
-
Antidot payload 1 IoCs
resource yara_rule behavioral3/files/fstream-3.dat family_antidot -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.belilu.acm/app_dex/classes.dex 4783 com.belilu.acm /data/user/0/com.belilu.acm/app_dex/classes.dex 4783 com.belilu.acm -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.belilu.acm -
Checks the application is allowed to request package installs through the package installer 1 TTPs 1 IoCs
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
description ioc Process Framework service call android.content.pm.IPackageManager.canRequestPackageInstalls com.belilu.acm -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.belilu.acm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.belilu.acm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.belilu.acm
Processes
-
com.belilu.acm1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Checks the application is allowed to request package installs through the package installer
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4783
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5f255edad36ca54915519e76fed7d8049
SHA11b5e5200fc0a4739f65170d8c62a12914272e480
SHA256ea8abdff5124a73c975b186e92de2fefc8d19b688082bea46cd7773b46374dfc
SHA512939eee51aa07b8672a911510603fa88fa1a5e9de2f907a2352e46d04cc2002dfb2c50aa7a91b8d1d92c724ecc0f7e992c412f6cd4f208cc7183a99a01dbdb397
-
Filesize
781KB
MD552c154dcde5d100bb1526079b0d7966c
SHA1fb8b8531e5c1da60d3d4ad3336df1202c6b2ee66
SHA2566c5ba604db8fcec76fbdca3a3a6356effc5d74cb20e526834157ec2c1055d56b
SHA51281d5297e24d3935b88c88a8bb5af2c2fa56323a375200f3d3ecd0215bdce53d13b017c2ed76f4668000eb3f5a9a61cbfb4661735f6b22c250bd12af68ee0263b
-
Filesize
782KB
MD537e70e82c84d65f7b0334ddd76d7b3ff
SHA10661ee06aa45c7c7e90e94b0ac3b19bb70f60b5f
SHA2563b8f83cf8b8e2033f0d1198ac495858e4803b4c655a4281a1f77187b7b779ce5
SHA512eec81c2771c655fb76f2ffb85f8fa24ae03eba6576299e295f21632e73d02f7c341c35f448ab8ac3de1b1b7eef409f1217e44fc55ce862f0cb5f022c70edc981
-
Filesize
8B
MD56c7580ad7d1f27a52eea393f48087d5b
SHA13bd61d6bdb5849dca1b956b5899e447dd81e1f01
SHA2568da58be7e62ae7f7d67c9da3fad6fb36b0b9764244d9ab083a751e7243ae4e8e
SHA512ae67de771c5e3ed971e94a801c4217984a85a9d32d0587bae6a2ad3b2bd7cd9e6da0d502780ff85d5dc32eafb2e55db5af778d56d5037a7cec04261d92d0ca30
-
Filesize
184KB
MD5522408bd82f3aa8b3b9f90fd62ef5ada
SHA100330892d9de60b33282e0121d72768bfd1ac140
SHA256b444917b5ce3d51d553e318755a3bfd071e28709880171b5bae57998ba37b12d
SHA51222d0286778b7330fa5da3c86552163b8e3ad9023ed002d8b98e1b024520a7041f812c3b9706a8eba49589fa77409baeed56cfabe0e36016ce3b0f7c317f31842
-
Filesize
512B
MD5b8271ea307f64a8ca81cd96647900346
SHA1448cbed6b1f936407b8a4dc5f062e893fbfd1912
SHA256b2d4a218ff373cf3b54544b23596eaada166139e4e29427a4502c7b67271b35d
SHA512e0217a6803220bce772258b122f7035e9e9235817893404775a39c702efae13d7dca9bdca9fbef5ac2647bcec81ff1f829c5f50634a00ef506e484b70352e161
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
422KB
MD51c9d96d554398c3a37de1bbcfbd26838
SHA12526044f929aa7ee919592e81b9f51530cfe678b
SHA256940d29319e2712612f7f1adb677482885114ac8771d7406e3049dd4b2bdc68b5
SHA51215b22f23d447053187f2032176c162ca819417e66f7a77a7d4e8be833468b16ddf59f59cfb64214f9809cc10a33610cb7cc7aa7d3b88fb4858c44706e3ae9c53
-
Filesize
16KB
MD58aeefd288a1d26532d3674a330698e7f
SHA14ab4b7f6d6c9254f420f724bbcc856e650ebe187
SHA2569f06a808513761c2be3a3de349cd23a3efef515757b64e1f83ee3fafe1123d21
SHA5125bbef9bdc50a2e6321e5c45b3e3830df2195d845c4bdfa4bdf205d8380912a3274331d4b92551c90b102f93e17b17ba99a4fb4f8e4dd46b989f021b2a60c4c4d
-
Filesize
116KB
MD5004d50e0c72215234b172709ab8ad410
SHA151509004d12e168012c265b22fd25e35bdbb66bf
SHA256d393164d8a0da2e2b1783ed321a80412ded42001186ad54d887ba55e4f6d2ce4
SHA512b0a30ed06543472db482e9df79de342296b660c30155c2dc54084a3cedc3ffa6ef0b6eb94ea3cf620b60c44b5beb0321964b57815bb95e297b50c4600292b5fe
-
Filesize
1013B
MD500290bc6b09ac837f078d4ac753e0284
SHA1135a20dd7ca2c536b52883a1c3210e146087ffc1
SHA2560f30686171731bd060c6bfed03aa7d8efd96b517b9dc9b962ac1432d7d9fc717
SHA5120d2a64d482fac57df157ea4278f8025fc4a1dc1918b78b282b61a3f34fbd74ab7cdd47dfac7f92f7c6378c58226ae0f952bf32cf5fd5f5fd919704a5c7ac0fe2
-
Filesize
25B
MD5b9d9e0f8902d129e1aeebff0ae7b725b
SHA1cb0d2b4c9dd60a5c1fc6261fb581bcd3416fe781
SHA25625a822139d06016af8be1296c0242b60e35074f94c713e03323636be1162ce91
SHA512f158a9dc753e0cb41f71a98714ff02198c576bacdd792a6153fdaf6f9a7b52d8cfb6d09099a269d0c1b0d31e2ea5a307ea1db85115bdc6797887a6de36d597f6