General

  • Target

    91daa704e74d61817ee1bf5ae02217b68fc352158c73e271f6a8f6295e3e9a8b.bin

  • Size

    3.4MB

  • Sample

    240620-3j6dasselc

  • MD5

    0293b9fa5ba0ce9f4713e1c9e1153929

  • SHA1

    e69be95a1c0c51298cd3307c9357d73133962d89

  • SHA256

    91daa704e74d61817ee1bf5ae02217b68fc352158c73e271f6a8f6295e3e9a8b

  • SHA512

    03039d2f0899ecf4a020690b77f77fe9ee9fb832682b9d298d009b70cbd5ec23d2ffadd480e68e9d995b3eebe1b76416550a1f2f8601a505a446a835c3a97b50

  • SSDEEP

    98304:2r6uINgJDINVmEVN8yhNUKtoYP7o7Rt8ebdxCdnJcaKxq:46uq2DIuGN82UQoYP84SdUtJcPq

Malware Config

Extracted

Family

axbanker

C2

https://icotot-81e9f-default-rtdb.firebaseio.com

Targets

    • Target

      91daa704e74d61817ee1bf5ae02217b68fc352158c73e271f6a8f6295e3e9a8b.bin

    • Size

      3.4MB

    • MD5

      0293b9fa5ba0ce9f4713e1c9e1153929

    • SHA1

      e69be95a1c0c51298cd3307c9357d73133962d89

    • SHA256

      91daa704e74d61817ee1bf5ae02217b68fc352158c73e271f6a8f6295e3e9a8b

    • SHA512

      03039d2f0899ecf4a020690b77f77fe9ee9fb832682b9d298d009b70cbd5ec23d2ffadd480e68e9d995b3eebe1b76416550a1f2f8601a505a446a835c3a97b50

    • SSDEEP

      98304:2r6uINgJDINVmEVN8yhNUKtoYP7o7Rt8ebdxCdnJcaKxq:46uq2DIuGN82UQoYP84SdUtJcPq

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Matrix

Tasks