General

  • Target

    0720AEDEF3D2C2B02548F7922A0A3663B31D85E470C0EE09476BC3789DDF5BA9.apk

  • Size

    52.6MB

  • Sample

    250414-tjtj3asvgw

  • MD5

    cf84555bba5c12fac6c937b3efe11d3b

  • SHA1

    8524f0e7ce2be16f28d2831dd5bb8536ac6bada2

  • SHA256

    0720aedef3d2c2b02548f7922a0a3663b31d85e470c0ee09476bc3789ddf5ba9

  • SHA512

    1983a75750ff895488810c509d908d94a1af95569eac1ab97dc455d289bb80346aaadf05887d8670698ae8fa6f722fe3767d425e1fa920a01e6e159abf456d1a

  • SSDEEP

    1572864:3AMvqmeOIJ5ojP+H4U9X4U9r8bwiGCUoSE7BKrwO:3r6dLojU4U9X4U9r8LR7BKH

Malware Config

Targets

    • Target

      0720AEDEF3D2C2B02548F7922A0A3663B31D85E470C0EE09476BC3789DDF5BA9.apk

    • Size

      52.6MB

    • MD5

      cf84555bba5c12fac6c937b3efe11d3b

    • SHA1

      8524f0e7ce2be16f28d2831dd5bb8536ac6bada2

    • SHA256

      0720aedef3d2c2b02548f7922a0a3663b31d85e470c0ee09476bc3789ddf5ba9

    • SHA512

      1983a75750ff895488810c509d908d94a1af95569eac1ab97dc455d289bb80346aaadf05887d8670698ae8fa6f722fe3767d425e1fa920a01e6e159abf456d1a

    • SSDEEP

      1572864:3AMvqmeOIJ5ojP+H4U9X4U9r8bwiGCUoSE7BKrwO:3r6dLojU4U9X4U9r8LR7BKH

    • AxBanker

      AxBanker is an Android banking trojan that targets bank customers information distributed through fake bank applications.

    • Axbanker family

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v16

Tasks