Analysis
-
max time kernel
143s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
10-04-2024 15:07
Behavioral task
behavioral1
Sample
fe95855691cada4493641bc4f01eb00c670c002166d6591fe38073dd0ea1d001.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
fe95855691cada4493641bc4f01eb00c670c002166d6591fe38073dd0ea1d001.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
fe95855691cada4493641bc4f01eb00c670c002166d6591fe38073dd0ea1d001.apk
-
Size
2.9MB
-
MD5
0e9122e851abfa05a132b88b234d9bf3
-
SHA1
9f949b095c2ab4b305b2ea168ae376adbba72ffb
-
SHA256
fe95855691cada4493641bc4f01eb00c670c002166d6591fe38073dd0ea1d001
-
SHA512
e275096af659fe700245cd8d3953fd7fba613675af19108b26b8fe2073b45faf141a94901c601b2791fdee40c5ed3dc437dd1541d84a26aef53aeb9d70851aa5
-
SSDEEP
49152:Br5qyWl9vKOVTJKWJWs0p2NllLlFO6uRMA7YqyALoEdyqDVbgSw:lIym9SgTJKWUb6uYLkzDV0D
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.androidservices.support -
Requests cell location 1 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.androidservices.support -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.androidservices.support -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.androidservices.support -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.androidservices.support -
Queries information about running processes on the device. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.androidservices.support -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.androidservices.support -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.androidservices.support
Processes
-
com.androidservices.support1⤵
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)
- Requests cell location
- Checks CPU information
- Checks memory information
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4410
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD51cf3f63c021d755a21623e6d0e86dbc6
SHA1e40e0f1faa61abcca7ba3394c54c92ff7334b49b
SHA256100c67650ba652d547d8a1128edc550a8e95541a1d9268a199d1b924294d0895
SHA51238d72e14f3513ffd26989cbda3df46ed3dd6e731bdfae56440eff6b64760cc13f91014281c9add61e018fe3529e49c63a6892ca22479515816c768b546244466
-
Filesize
512B
MD5450bf40a30433dae6cc12ce0f30c2e43
SHA168cb84d7e1e360cb080bdd4728164967cd19f824
SHA2567769aff31be34cab6d59345bcd88ffd0d6e112f08b3d3f719d5204c964a639f5
SHA512035edc901147b0fc76b82ad9879362bcb61616f5b523efaea6fe6ef6e974df6f4fdf6b83bb0b6d80f55c310842455e8f2378deb0851de5a8edf8cf9f151b4bb0
-
Filesize
8KB
MD54073e588ee16aeeb93f71cf1f752e0b4
SHA17347f143fd936f3bc80e6ef0bee41eb794f7b649
SHA256e761d56ad0f14fff4ce44f2a214f66458c19ac1a3d9221bbb6b4bbae72013d73
SHA51201ba52e1e4c3f5890226d806ecf6e525c4bb207cb62d4380bc97aa4245d4cff6c56dbb8849a1c0abefb8eadfee81019dc5f9f823a2f49cdd4c33597bfa725912
-
Filesize
8KB
MD553bfa0c040acbdeb8549c2e630d9348f
SHA17019e28bcb1446a35caeca6ef8cb5f54485d32e3
SHA256fe16820ec4701e37a74ec6be73118bf52782afd488c93faa652fbf9bb1bebd88
SHA512e0e623f33a08959a78311c4fd1686eb6bc41c1318865d35779ed33719d1d91d0c34dd729cd897cc5c86a301796ac145a98666b06c4764225f690baafdb9f17af
-
Filesize
114B
MD52236a883a4d0d756421b04203acbba81
SHA17f2ab2bc7462113bdab1898a6361b8288917fa98
SHA2566719f3e24efff87108279ad673d8290431a8940bca3143374dc276000093bc3b
SHA512302a609c004a2ee6624e7a1eeca96f5def28657035b7b6fa89b3e21306a2a15d17947df983911886b1bc695716bd829b4938f35d4cc6f0025f9d5804edb0c297
-
Filesize
90B
MD5396c28a21211f2fe469ed95a5f38bf37
SHA1497ea274715b84722f75fa302ce79cb6d3eb6519
SHA256f1ce61d85330302a9c29bb43beee349289fda7c33273ee18d71545ac366f9191
SHA5120506e969c274461bbb313816122a2c385f59f658973a0b0d92dcaabb072ee941e4981db2fae9cbc06079d1c3a9018cbda8fccc1b50605d906c7a75446493331a