Analysis
-
max time kernel
1750251s -
max time network
159s -
platform
android_x64 -
resource
android-x64-arm64-20231211-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231211-enlocale:en-usos:android-11-x64system -
submitted
14-12-2023 12:31
Behavioral task
behavioral1
Sample
app1701808954826.apk
Resource
android-x64-20231211-en
General
-
Target
app1701808954826.apk
-
Size
4.6MB
-
MD5
9edcd2b1a59467c04b22907506896100
-
SHA1
665c8ab07fe0348a873b4cebc0876ad956e9951d
-
SHA256
ecf2839925b8b193f47a082a4c4f0629fa933047a7f6a275a9c57e78192da13a
-
SHA512
d7110251f04d7440bcf1c23694daa6b8f0516c7ac03915e26665e13d7a2c1026f589daa816b75a50d2d29780b9ec81100e4b715f06addad6a6bbcc59a6d742c3
-
SSDEEP
98304:ipv4piBUXLB8BmzmzBkTg0twt4begRbvZx0SJo3CsnGg:u4picKkzdL/C6xro30g
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
adolescent.transsexual.writingsdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId adolescent.transsexual.writings Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText adolescent.transsexual.writings Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId adolescent.transsexual.writings -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
Processes:
adolescent.transsexual.writingsdescription ioc process Framework service call android.content.pm.IPackageManager.getInstalledApplications adolescent.transsexual.writings -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
adolescent.transsexual.writingsdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS adolescent.transsexual.writings -
Acquires the wake lock 1 IoCs
Processes:
adolescent.transsexual.writingsdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock adolescent.transsexual.writings -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
Processes:
adolescent.transsexual.writingsdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS adolescent.transsexual.writings
Processes
-
adolescent.transsexual.writings1⤵
- Makes use of the framework's Accessibility service
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Requests enabling of the accessibility settings.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txtFilesize
29B
MD5dae518fc612023592c403b28d9af592b
SHA17d5337037d8036ae16b471de5a3d386aed78deb1
SHA256e41e01b7650c6d9d54df9a2c680798f4a05563c5ff5ab79a5ffa64007c30552e
SHA512a0da57c21201cc11444a0dbc54628a2af77ee1e972acf695efa052a4b84b34858fad90c0708e17d8b44982a277a2ef432bf1d1c913dbdc5c72e050a238b2d662
-
/storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txtFilesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
/storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txtFilesize
284B
MD5a6e0cfad6d2c0f7afb019be037540aa5
SHA12a8d8b52053777a678b3e4e984fdd82c8f2e128f
SHA25663581407c4406453ed2201ca0634e052444f81cd031fb5569d36baa31124a946
SHA51277f6947e1cf2fb10a5e3f05cdc86be6beee9f96f80c0284cf9b69613be83cc1c3871d2bfccf795e69612dc3481aa239ec552696f2a4dd84c90704226dd4b8172
-
/storage/emulated/0/Config/sys/apps/log/log-2023-12-14.txtFilesize
57B
MD53af69119804d1d999d56d230338ffd36
SHA169350826205583c8acc385ee0a6e3fc2673ee2ca
SHA25610994862cb263ab6b1e4428cc24cc9c585458fc67544fe0f5dfea81a5a7a115c
SHA5124a41b19d28f637b397d9dff225621694c44c750a9bd65f3e6ad5d3b9acf0d118910ddf53d4618213f9e14c61e0fb154f33f2747dd3b8d50459990767f42fc8cb