Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
17-04-2024 22:00
Behavioral task
behavioral1
Sample
91fda73902e1a2a76b999df11caa4532c9c440d6f3da63dc03e0a78109d7583a.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
91fda73902e1a2a76b999df11caa4532c9c440d6f3da63dc03e0a78109d7583a.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
91fda73902e1a2a76b999df11caa4532c9c440d6f3da63dc03e0a78109d7583a.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
91fda73902e1a2a76b999df11caa4532c9c440d6f3da63dc03e0a78109d7583a.apk
-
Size
4.6MB
-
MD5
b3f067b4dfea589351b3f5f25dfb1b3c
-
SHA1
4982a6e134a829373ac75c988b8f1717bb0782ef
-
SHA256
91fda73902e1a2a76b999df11caa4532c9c440d6f3da63dc03e0a78109d7583a
-
SHA512
14190a172461475458621a483e9b47cd6d8b0dee138e7d07cc8ac3e1ffbbf4d910ea61fb86ae5a80a5f88e1b4de4a5a90f18bf7d37f3996529d5e8d1bedae30a
-
SSDEEP
98304:x9hinlhin6Vhinahinx1hin6hinshinUhinyPSw9UwwriyP1qwgOBpOeaD18E/p:xbCzC6DC8CxjCcCyCKCy9UwwrtgfOBps
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 2 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.andamago.newicondescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.andamago.newicon Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.andamago.newicon -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.andamago.newicondescription ioc Process File opened for read /proc/cpuinfo com.andamago.newicon -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.andamago.newicondescription ioc Process File opened for read /proc/meminfo com.andamago.newicon -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.andamago.newicondescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.andamago.newicon -
Acquires the wake lock 1 IoCs
Processes:
com.andamago.newicondescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.andamago.newicon
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5d5d190e1180c5e6858c40a93f7526f12
SHA10d054f2e34776c8d5bcfd54d743831b9919618fe
SHA256274fe3e82fc2630d99809afd6a1c64768a77ed69c04b33e0df6a292a5a042203
SHA5120d58df37359d6e35f02ef95e4edcfb05fac6c3bc57d1c3e56e49fa7b6c66aef3f99b383cb14dc5a01b52bc6a0d4685f275fb30279aa26e8339a5e0b8416ba85e
-
Filesize
121KB
MD57b38720a0352dffa26411726c72dd2b0
SHA1b15e687f42abcdc12427f146a3115ef2259211f8
SHA2562013f490d45638cada331b3474ed65b9a43cec60da773accc98332e58c06336d
SHA5120df28f87da4f9beb3ca8c108f54021a2a1a1434771abbb5ba67a2736097f2287b05e5220a33e92c42ee13ecae1144714a422b986763712794f69e65bc44c83e3
-
Filesize
11B
MD51b65c10c6215685f9d621d797f911373
SHA1cc50aaed5cd521a62ec8cf9fe0413153ec90f265
SHA2562230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89
SHA5125a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f