Analysis

  • max time kernel
    1856552s
  • max time network
    606s
  • platform
    android_x86
  • resource
    android-x86-arm-20231215-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system
  • submitted
    15-12-2023 17:47

General

  • Target

    childapp.apk

  • Size

    9.3MB

  • MD5

    03f90a93ebc7efc3d659316ddaf5ad7f

  • SHA1

    16f390153e7e20527986d94b59921de1667741a7

  • SHA256

    12789207f5b450b2a1c0bcf37bc38d05abf8bcad214e6e5cdcc9ca334213a475

  • SHA512

    13ed65e387b779315dc5bc7682a2de9cd4b5dbd0894ad90fb499af30f99f51a508479a0f106a3c3ab28860cc5d48fdda433ea64d2f0145fb16c5ffd13612715a

  • SSDEEP

    98304:bnLIST4EuX895UU+Ap6XZjXKnXqyNpFKmzHzBqT90tgxL6:DLI84ZYrVpADCrN3lzEyp

Score
8/10

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
  • Acquires the wake lock 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs

Processes

  • forward.calculation.customized
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
    • Acquires the wake lock
    PID:4252

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2023-12-15.txt
    Filesize

    33B

    MD5

    07b8abb22dc013011b30a6d152111994

    SHA1

    14d9d0763e3b2e513f855d069aef8e6c4a13f9a2

    SHA256

    d5947944eff8e03f7edddee0a43e42ca56dd448a95368283aee39f27107d8f8c

    SHA512

    0770b0f7d47e4d2b8ba22d29c7c1428af80a9c35111c918495513b568a91c56fe29fd91e4fedf7c3a34bae65e77460b4f241917834e45c1195ed2f5ee5b45f87