General
-
Target
248233C4E61912FDF59AA96976A09267888CC0855AFE781967F6BBB125E67B9E.apk
-
Size
52.7MB
-
Sample
250414-tfeazastbw
-
MD5
d09c1f30378a95f68276c4038c9fa193
-
SHA1
4fd67e9b01517bfd63c538135d4b492b14d89240
-
SHA256
248233c4e61912fdf59aa96976a09267888cc0855afe781967f6bbb125e67b9e
-
SHA512
9030b9038e874cc46ef033e9f69f0d34d61d67a720efcfbef611ce916d3f6f81861417dbef0512b488515f687092052df82bc27e944acbad6a9181039b432a22
-
SSDEEP
1572864:3smbmeO6FFjP+H4U9X4U9r8bwi6CUoSE7PKrwc:c07jjU4U9X4U9rILR7PKF
Behavioral task
behavioral1
Sample
248233C4E61912FDF59AA96976A09267888CC0855AFE781967F6BBB125E67B9E.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
248233C4E61912FDF59AA96976A09267888CC0855AFE781967F6BBB125E67B9E.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
248233C4E61912FDF59AA96976A09267888CC0855AFE781967F6BBB125E67B9E.apk
-
Size
52.7MB
-
MD5
d09c1f30378a95f68276c4038c9fa193
-
SHA1
4fd67e9b01517bfd63c538135d4b492b14d89240
-
SHA256
248233c4e61912fdf59aa96976a09267888cc0855afe781967f6bbb125e67b9e
-
SHA512
9030b9038e874cc46ef033e9f69f0d34d61d67a720efcfbef611ce916d3f6f81861417dbef0512b488515f687092052df82bc27e944acbad6a9181039b432a22
-
SSDEEP
1572864:3smbmeO6FFjP+H4U9X4U9r8bwi6CUoSE7PKrwc:c07jjU4U9X4U9rILR7PKF
-
AxBanker
AxBanker is an Android banking trojan that targets bank customers information distributed through fake bank applications.
-
Axbanker family
-
Checks if the Android device is rooted.
-
Checks Android system properties for emulator presence.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v16
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
3System Checks
3