Analysis
-
max time kernel
2470680s -
max time network
164s -
platform
android_x64 -
resource
android-x64-arm64-20220310-en -
submitted
05-05-2022 08:06
Static task
static1
Behavioral task
behavioral1
Sample
psk.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
psk.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
psk.apk
Resource
android-x64-arm64-20220310-en
General
-
Target
psk.apk
-
Size
2.0MB
-
MD5
26bbb10b28f49e3f0802e515b80b433c
-
SHA1
e92586db0d1e1699baba2de748562d11b2177380
-
SHA256
9eceb9cfa14c5f82cf31bdced380faec9bf35060defe355c066e1acb36ba66ea
-
SHA512
1febd124383efddad324b0cc6f0ce73fd231f0e8bcc85e076622533a66d30b3a86505acb079cce77d258f155ccc8522c645da49f5bd90cf2cc15d20560166ac0
Malware Config
Signatures
-
Makes use of the framework's Accessibility service. 3 IoCs
Processes:
com.mazocexayori.kutedescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mazocexayori.kute Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mazocexayori.kute Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mazocexayori.kute -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
com.mazocexayori.kutedescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.mazocexayori.kute -
Acquires the wake lock. 1 IoCs
Processes:
com.mazocexayori.kutedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.mazocexayori.kute -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mazocexayori.kuteioc pid process /data/user/0/com.mazocexayori.kute/app_DynamicOptDex/UNwnOrK.json 7043 com.mazocexayori.kute [anon:dalvik-classes.dex extracted in memory from /data/user/0/com.mazocexayori.kute/app_DynamicOptDex/UNwnOrK.json] 7043 com.mazocexayori.kute -
Queries the unique device ID (IMEI, MEID, IMSI).
-
Removes a system notification. 1 IoCs
Processes:
com.mazocexayori.kutedescription ioc process Framework service call android.app.INotificationManager.cancelNotificationWithTag com.mazocexayori.kute -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.mazocexayori.kutedescription ioc process Framework API call javax.crypto.Cipher.doFinal com.mazocexayori.kute
Processes
-
com.mazocexayori.kute1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Removes a system notification.
- Uses Crypto APIs (Might try to encrypt user data).
PID:7043
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD5b2693b13d14bc3fb7a2f439ac13a9e1a
SHA1a2660240ad46e39bc74dc3c6e77c284e40fec464
SHA2563d34855c12421965f240c93e5d69d7dc7a445e5a723f738513bd9c971a1e44a5
SHA5120c62f9d640f301a12ed44f55be04a0ef3342022a87a8968444d1c4b04bdf8c66cbf45fc94e51eaf9e4ebe307140333ffd1ccccee8cffc879ee792617f3aad670
-
Filesize
899KB
MD5469e764d83595045fb5f0d08b03adb3a
SHA19b31424e2be9320e4484235691c2e39aaf870271
SHA256d4e5fc87c9c19bcaa58bd78327d7eb240c983435cd6eaa772424c4166248177c
SHA5127caca18d874d3731cc7a5ebfc9f1ddfe87793557e00b5592e909f333f6e1a1dbb12040132d51ba02567360720d54e716102c212f711b9a80ceec8c3f1194e56f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
[anon:dalvik-classes.dex extracted in memory from /data/user/0/com.mazocexayori.kute/app_DynamicOptDex/UNwnOrK.json]
Filesize899KB
MD5469e764d83595045fb5f0d08b03adb3a
SHA19b31424e2be9320e4484235691c2e39aaf870271
SHA256d4e5fc87c9c19bcaa58bd78327d7eb240c983435cd6eaa772424c4166248177c
SHA5127caca18d874d3731cc7a5ebfc9f1ddfe87793557e00b5592e909f333f6e1a1dbb12040132d51ba02567360720d54e716102c212f711b9a80ceec8c3f1194e56f