Analysis

  • max time kernel
    1750250s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-20231211-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231211-enlocale:en-usos:android-10-x64system
  • submitted
    14-12-2023 12:31

General

  • Target

    app1701808954826.apk

  • Size

    4.6MB

  • MD5

    9edcd2b1a59467c04b22907506896100

  • SHA1

    665c8ab07fe0348a873b4cebc0876ad956e9951d

  • SHA256

    ecf2839925b8b193f47a082a4c4f0629fa933047a7f6a275a9c57e78192da13a

  • SHA512

    d7110251f04d7440bcf1c23694daa6b8f0516c7ac03915e26665e13d7a2c1026f589daa816b75a50d2d29780b9ec81100e4b715f06addad6a6bbcc59a6d742c3

  • SSDEEP

    98304:ipv4piBUXLB8BmzmzBkTg0twt4begRbvZx0SJo3CsnGg:u4picKkzdL/C6xro30g

Score
8/10

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs

Processes

  • adolescent.transsexual.writings
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Acquires the wake lock
    PID:5030

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txt
    Filesize

    29B

    MD5

    dae518fc612023592c403b28d9af592b

    SHA1

    7d5337037d8036ae16b471de5a3d386aed78deb1

    SHA256

    e41e01b7650c6d9d54df9a2c680798f4a05563c5ff5ab79a5ffa64007c30552e

    SHA512

    a0da57c21201cc11444a0dbc54628a2af77ee1e972acf695efa052a4b84b34858fad90c0708e17d8b44982a277a2ef432bf1d1c913dbdc5c72e050a238b2d662

  • /storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txt
    Filesize

    25B

    MD5

    ba30336bf53d54ed3c0ea69dd545de8c

    SHA1

    ce99c6724c75b93b7448e2d9fac16ca702a5711f

    SHA256

    2d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af

    SHA512

    eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e

  • /storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txt
    Filesize

    284B

    MD5

    a6e0cfad6d2c0f7afb019be037540aa5

    SHA1

    2a8d8b52053777a678b3e4e984fdd82c8f2e128f

    SHA256

    63581407c4406453ed2201ca0634e052444f81cd031fb5569d36baa31124a946

    SHA512

    77f6947e1cf2fb10a5e3f05cdc86be6beee9f96f80c0284cf9b69613be83cc1c3871d2bfccf795e69612dc3481aa239ec552696f2a4dd84c90704226dd4b8172

  • /storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txt
    Filesize

    57B

    MD5

    a9ec0c42a43c72d73c499e5c17ccbb8b

    SHA1

    731652fbfe61eac3fdb4b9d3e2eaa010848a0906

    SHA256

    6c5309ce3f31c9af3288b0de3305b7f5ddee97be60ca4ac1184f3c334480c05b

    SHA512

    5f8ed24a51f68cfa0627aceb9190d3a7febaee61bd5a89898ab113ddaa7ce2a41f129a28c4e200d5e5e4ddff7a483abc0393dc38e870782caf1c46d2ec0df2e3