General

  • Target

    EBD0A34D04D7B9C180063AC4731542A2A805C10CC6B4020BADBAB72B3313F886.apk

  • Size

    52.8MB

  • Sample

    250414-vqx2hawvav

  • MD5

    8e1ec427e04043c9d1fcdd4b5d8b9d0b

  • SHA1

    874cf8527fadfc0412696e2b328092012b09f8a7

  • SHA256

    ebd0a34d04d7b9c180063ac4731542a2a805c10cc6b4020badbab72b3313f886

  • SHA512

    21474f3a573adb055ae6540b065a461b0d2a17fc46ec243f9bb5e837a0d39524f5bacf40f8aaa7d58f99e933abba2eec86ab0addcec05b1a24651fe5f5b78566

  • SSDEEP

    1572864:m7MNwmeO10tu+jP+m4U9c4U9O8E+wQ6CUoSE7PKrwW:2kEBjz4U9c4U9OBgLR7PKx

Malware Config

Targets

    • Target

      EBD0A34D04D7B9C180063AC4731542A2A805C10CC6B4020BADBAB72B3313F886.apk

    • Size

      52.8MB

    • MD5

      8e1ec427e04043c9d1fcdd4b5d8b9d0b

    • SHA1

      874cf8527fadfc0412696e2b328092012b09f8a7

    • SHA256

      ebd0a34d04d7b9c180063ac4731542a2a805c10cc6b4020badbab72b3313f886

    • SHA512

      21474f3a573adb055ae6540b065a461b0d2a17fc46ec243f9bb5e837a0d39524f5bacf40f8aaa7d58f99e933abba2eec86ab0addcec05b1a24651fe5f5b78566

    • SSDEEP

      1572864:m7MNwmeO10tu+jP+m4U9c4U9O8E+wQ6CUoSE7PKrwW:2kEBjz4U9c4U9OBgLR7PKx

    • AxBanker

      AxBanker is an Android banking trojan that targets bank customers information distributed through fake bank applications.

    • Axbanker family

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v16

Tasks