General

  • Target

    ec3e046e3ec9519fde99e35cfae3a958.apk

  • Size

    5.3MB

  • Sample

    240701-kg51msveqr

  • MD5

    ec3e046e3ec9519fde99e35cfae3a958

  • SHA1

    cc6caaf13f5ef7b5e845cee881c0fd63b3d48455

  • SHA256

    07d47a836fe5f766119bfc3ed8f9f4c51db57890a2252f44712e1fa043a20bae

  • SHA512

    9ff9503f5f0335263f310522f39ec5b36fec0ed4a99062df8c2ad9cb78df9c91ae57ecf3f02f81f91574d0ec6679dbcb9d5475856ccc8c50de58176b792b2762

  • SSDEEP

    98304:HX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LUhkeSUC/v9pWZHT/JoTwr5xpiXu:qvH0fpstpnVMVMAPHZhpLGke/gWVhpD

Malware Config

Extracted

Family

axbanker

C2

https://sheet-14c1d-default-rtdb.firebaseio.com

Targets

    • Target

      ec3e046e3ec9519fde99e35cfae3a958.apk

    • Size

      5.3MB

    • MD5

      ec3e046e3ec9519fde99e35cfae3a958

    • SHA1

      cc6caaf13f5ef7b5e845cee881c0fd63b3d48455

    • SHA256

      07d47a836fe5f766119bfc3ed8f9f4c51db57890a2252f44712e1fa043a20bae

    • SHA512

      9ff9503f5f0335263f310522f39ec5b36fec0ed4a99062df8c2ad9cb78df9c91ae57ecf3f02f81f91574d0ec6679dbcb9d5475856ccc8c50de58176b792b2762

    • SSDEEP

      98304:HX6vH0fpdsCl039pnVVuzpVMAPHS8rf/O+T1LUhkeSUC/v9pWZHT/JoTwr5xpiXu:qvH0fpstpnVMVMAPHZhpLGke/gWVhpD

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks