Analysis
-
max time kernel
4090813s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20230831-en -
submitted
03-10-2023 04:35
Static task
static1
Behavioral task
behavioral1
Sample
36e0cfd29afaa0b0d6c7e5da433379112514cbe1b03b2c82d32f2fc14d57086b.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral2
Sample
36e0cfd29afaa0b0d6c7e5da433379112514cbe1b03b2c82d32f2fc14d57086b.apk
Resource
android-x64-arm64-20230831-en
Behavioral task
behavioral3
Sample
36e0cfd29afaa0b0d6c7e5da433379112514cbe1b03b2c82d32f2fc14d57086b.apk
Resource
android-x86-arm-20230831-en
General
-
Target
36e0cfd29afaa0b0d6c7e5da433379112514cbe1b03b2c82d32f2fc14d57086b.apk
-
Size
123KB
-
MD5
39074c61fffeccf21907cd3dbf3ffffe
-
SHA1
329c2e94e8c95a0d588fed72ea7e53fe21ea7837
-
SHA256
36e0cfd29afaa0b0d6c7e5da433379112514cbe1b03b2c82d32f2fc14d57086b
-
SHA512
119ec034f5286a2f7b5e78ed563ee18cbb6b8f602abb9001e4fa0248f6ae9bb259998591bc2b839bbad9b1e5412b8425a26f0ff45ec6e4beec1cd54084f5de66
-
SSDEEP
3072:xKoSoUSoJh/U99KFdlvgDG14p4aG7O48SKZxKSp6ZF:xNjAJW6YDQozAOuKZ/a
Malware Config
Extracted
coper
https://4-u.wtf/
https://fitnessstyle.xyz/
https://sportsstyle.club/
Signatures
-
Coper
Coper is an Android banking Trojan with a multi-stage infection mechanism first seen in July 2021.
-
Coper payload 3 IoCs
Processes:
resource yara_rule /data/user/0/com.lineanysl/cache/syxinxxjzdmhf family_coper /data/user/0/com.lineanysl/cache/syxinxxjzdmhf family_coper /data/user/0/com.lineanysl/cache/syxinxxjzdmhf family_coper -
Makes use of the framework's Accessibility service. 1 IoCs
Processes:
com.lineanysldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.lineanysl -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
Processes:
com.lineanysldescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.lineanysl -
Acquires the wake lock. 1 IoCs
Processes:
com.lineanysldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.lineanysl -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.lineanyslioc pid process /data/user/0/com.lineanysl/cache/syxinxxjzdmhf 4554 com.lineanysl /data/user/0/com.lineanysl/cache/syxinxxjzdmhf 4554 com.lineanysl -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.lineanysldescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.lineanysl -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.lineanysldescription ioc process Framework API call javax.crypto.Cipher.doFinal com.lineanysl
Processes
-
com.lineanysl1⤵
- Makes use of the framework's Accessibility service.
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
- Requests enabling of the accessibility settings.
- Uses Crypto APIs (Might try to encrypt user data).
PID:4554
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234B
MD52415387c7f91e2ba741146957e4cbe5a
SHA18198c0a91d2e57eba261df042dae3566d7d3c8f0
SHA256a9e179a74df3654bbbd5249f8aed1b17221a717418deec305dc070f01219345f
SHA51253abf63f7c184e1f2c5173dbde97c75a75871156a4bcca677c91edf2519b7ca4fbd21cdae3f033d6ad0f81bbf4fc2955eef446178537854dc83533bb515fd55f
-
Filesize
72KB
MD59af1044411e312db0bca097cba17b972
SHA1f2de6a855f04a0f5e0999c5b413347adaa1197e2
SHA256b67a102526766779119a6428b4e4ea6b94f7bb31eaec21cb82f96fb49524f604
SHA51275615e48dcdaa67a06e294b991e90f94503553cf2f0708e3d2db227afdd1d408e7f902ec71302882abc198d4511965d2dcb1e42822aa69f990e009e8543f5f6d
-
Filesize
72KB
MD59af1044411e312db0bca097cba17b972
SHA1f2de6a855f04a0f5e0999c5b413347adaa1197e2
SHA256b67a102526766779119a6428b4e4ea6b94f7bb31eaec21cb82f96fb49524f604
SHA51275615e48dcdaa67a06e294b991e90f94503553cf2f0708e3d2db227afdd1d408e7f902ec71302882abc198d4511965d2dcb1e42822aa69f990e009e8543f5f6d
-
Filesize
72KB
MD59af1044411e312db0bca097cba17b972
SHA1f2de6a855f04a0f5e0999c5b413347adaa1197e2
SHA256b67a102526766779119a6428b4e4ea6b94f7bb31eaec21cb82f96fb49524f604
SHA51275615e48dcdaa67a06e294b991e90f94503553cf2f0708e3d2db227afdd1d408e7f902ec71302882abc198d4511965d2dcb1e42822aa69f990e009e8543f5f6d