Analysis
-
max time kernel
148s -
max time network
157s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
04-04-2024 22:01
Behavioral task
behavioral1
Sample
9762eba15b893609b9461125c5adbcaf3bac7fea9536ffca72566abfa1bed084.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
9762eba15b893609b9461125c5adbcaf3bac7fea9536ffca72566abfa1bed084.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
9762eba15b893609b9461125c5adbcaf3bac7fea9536ffca72566abfa1bed084.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
9762eba15b893609b9461125c5adbcaf3bac7fea9536ffca72566abfa1bed084.apk
-
Size
4.5MB
-
MD5
99c2d9582ecc4a34e466cf71e6054e84
-
SHA1
bd73f00c40464602f9a16ce6aeb0cbce62fb6451
-
SHA256
9762eba15b893609b9461125c5adbcaf3bac7fea9536ffca72566abfa1bed084
-
SHA512
7398dbccf7f84370280d3c6ed342c9f14e49c78a33930ab437e042f8d1baaf702d2da11c95c7430e4155081576307c64cc4db7bbf2718ba21ff68654b5c342db
-
SSDEEP
98304:+rrhinthin6thinyhinxdhinihinkhin8hin+r4Kx2N4tOUHKt/TFiqa1:+CrC6rCECx7CUC6CiC+r4KYatOUHY5K
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.bnltokensicuroappnuova.apkdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bnltokensicuroappnuova.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bnltokensicuroappnuova.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.bnltokensicuroappnuova.apk -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.bnltokensicuroappnuova.apkdescription ioc Process File opened for read /proc/cpuinfo com.bnltokensicuroappnuova.apk -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.bnltokensicuroappnuova.apkdescription ioc Process File opened for read /proc/meminfo com.bnltokensicuroappnuova.apk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.bnltokensicuroappnuova.apkdescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bnltokensicuroappnuova.apk -
Acquires the wake lock 1 IoCs
Processes:
com.bnltokensicuroappnuova.apkdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bnltokensicuroappnuova.apk
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
311B
MD5255b6ffd48a6b3d674a2da2d4d491e5b
SHA122c76043ca4289193bbeba01148a23a14dbb9695
SHA256e666049caaabf41dd239f8455cca9cd2e555b4ec0978a894dfe7bf71ff2e7d15
SHA51238b5442611b2cdba70bd1fad2a7f9882843a3f8ad929a936e8bffcdcd090e3e4facfda96646b7ad67c3459f3d30ffc4fc7eeb8ecda0739eaff02ebbab668b7f2
-
Filesize
4B
MD5098f6bcd4621d373cade4e832627b4f6
SHA1a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
SHA2569f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
SHA512ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
-
Filesize
44KB
MD5d5d190e1180c5e6858c40a93f7526f12
SHA10d054f2e34776c8d5bcfd54d743831b9919618fe
SHA256274fe3e82fc2630d99809afd6a1c64768a77ed69c04b33e0df6a292a5a042203
SHA5120d58df37359d6e35f02ef95e4edcfb05fac6c3bc57d1c3e56e49fa7b6c66aef3f99b383cb14dc5a01b52bc6a0d4685f275fb30279aa26e8339a5e0b8416ba85e
-
Filesize
4KB
MD52c6fe773f7cc42d162630d93a98fa91f
SHA1a0d76f9403df661aea3017a0d912de03c415e3a9
SHA2563855acc95e1e3648649a16c91abdcb1e2eb81826ae6171a0ab25c5b74452f186
SHA51220436ab982d11ec32d69267c93c378e4ad92d8f840f5b412984af5aa0240f0eb8df757fdfde5ab95a2649c6f9862d9b633cd8dfcab5c07c1a4533072600c39a6
-
Filesize
4KB
MD54bb66824d01c74e6ab2421b31027458b
SHA1ae9253bbdb81b322b6e4fda10ed025aa04027160
SHA2568966d8a15c7a95cface39051ecc0a83bb52c8fffd0a546e33fea8863a8e06055
SHA512adf766f5f2e6707ec389513b0edbdc143921bff9ce666cceb1505f38726ff7a38bd8bb7b0608df13c6ae6b3f3347c79cd3adb0215fe38b01605c78890ad640ce
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
73KB
MD5b939bfddae63d6eeb43f71e60c5fe2e5
SHA1d20e224ddfac3efc818ca7ec35327b3a549f0e70
SHA2568b0f662fc6a3c42378b9abe0a47963997a054eba207dd5a1ce8b2c6dbbe71d6e
SHA5124987a75bf83e843607b7d8a76dcd0fb944298568103f7e9bdbec3b538582e2adaf514ca8d182f8be7dd381a2774fa40146124e58b1e755554c297fbdabb0bb4a
-
Filesize
11B
MD51b65c10c6215685f9d621d797f911373
SHA1cc50aaed5cd521a62ec8cf9fe0413153ec90f265
SHA2562230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89
SHA5125a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f