General

  • Target

    29650bb7ee441cd6c3abbe4b0bff2fb2.apk

  • Size

    5.3MB

  • Sample

    240630-re37laygjc

  • MD5

    29650bb7ee441cd6c3abbe4b0bff2fb2

  • SHA1

    318417164f1eb9f1e47bf5ae2ce1e4388944bc3c

  • SHA256

    8b9696f08c6941711ef1de573aac74b71f609c7e615aea078781434b0bfcd600

  • SHA512

    9bd5e4ccb569b81c71b2bb7d37367bee14b4b3bd246e91a4f04c087d6539bcadf0405c8d6272d69fcab4bab0828b5affb23475c34d7158730f443d027375554f

  • SSDEEP

    98304:fX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LU3kaeACJol1M+PLXRoTwr5xpiP9:SvH0fpstpnVMVMAPHZhpLwkarDMeRpY

Malware Config

Extracted

Family

axbanker

C2

https://sheet-14c1d-default-rtdb.firebaseio.com

Targets

    • Target

      29650bb7ee441cd6c3abbe4b0bff2fb2.apk

    • Size

      5.3MB

    • MD5

      29650bb7ee441cd6c3abbe4b0bff2fb2

    • SHA1

      318417164f1eb9f1e47bf5ae2ce1e4388944bc3c

    • SHA256

      8b9696f08c6941711ef1de573aac74b71f609c7e615aea078781434b0bfcd600

    • SHA512

      9bd5e4ccb569b81c71b2bb7d37367bee14b4b3bd246e91a4f04c087d6539bcadf0405c8d6272d69fcab4bab0828b5affb23475c34d7158730f443d027375554f

    • SSDEEP

      98304:fX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LU3kaeACJol1M+PLXRoTwr5xpiP9:SvH0fpstpnVMVMAPHZhpLwkarDMeRpY

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

MITRE ATT&CK Matrix

Tasks