Analysis

  • max time kernel
    309s
  • max time network
    319s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240229-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240229-enlocale:en-usos:android-13-x64system
  • submitted
    31-03-2024 14:52

General

  • Target

    ready.apk

  • Size

    53.6MB

  • MD5

    e29997bcbd59a9299134bb762959fa4c

  • SHA1

    2b27ce92fe1c8baf7332805bcb2cf923b491cac2

  • SHA256

    f5d84a3bd44d1511e00a67ae1c79f2076dc8972dc11c616d6130dc4eba0e3555

  • SHA512

    70df8550eedf6bfbb35a038f87fa2fa3837f8789d3b7384c2320f823e58fee8e5d84fb28839645d81c078dd64bf67d6c10a06df9d80d9b74430cfa481fd56ae4

  • SSDEEP

    1572864:NmKR/R2InCUVZbWEB7e0Uyxr8a3MAPfSbJ77m6xu:1R2jU36DRyJOLbp7m6o

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 2 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 20 IoCs

Processes

  • splash.app.main
    1⤵
    • Makes use of the framework's Accessibility service
    • Makes use of the framework's foreground persistence service
    PID:4260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/.base.apk
    Filesize

    56.8MB

    MD5

    8c5a8a5543509a20f79de96ac53fe4e5

    SHA1

    6a58abfecf85940811517d6b44a2abeb4b4514dc

    SHA256

    eb19c045b8a70e71e69c8773a96656ed17f6ff4ab8fd3d1e2d4f3cbc0ccc4b54

    SHA512

    523bc59e9acea6907fc57ab26b019b9fbd9e138f708aabc8fd4d5585f24e0a45ae7a877dadc22c51e24a863a849f4f4d29e4b8f36a9ee6eb22e2a852117dbdcf