Analysis
-
max time kernel
1809s -
max time network
1814s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
21-04-2024 14:24
Behavioral task
behavioral1
Sample
ypA3Wwq.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral2
Sample
ypA3Wwq.apk
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral3
Sample
ypA3Wwq.apk
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral4
Sample
ypA3Wwq.apk
Resource
android-x86-arm-20240221-en
General
-
Target
ypA3Wwq.apk
-
Size
4.5MB
-
MD5
df71b9a448eb918ca6720e14b5c5d772
-
SHA1
045c5f0367043e214c9f889ae1b21f1550648c6f
-
SHA256
ffc417297b1e348c69930abde0a93f0a2aa55afc0222fe3052d309c70451da7b
-
SHA512
42815e0859ffd8b08d0283cab92ac7c76b77121a03aee36831215232052c3e013d7613d360eb1de1153cf508ba53b6bb20af07fd9d789ab4a581d103833ce1a8
-
SSDEEP
98304:EPthoqu9nseE56hBnPdKYNA7mzFzBsT10twRNwkinn:otGRMshFk8zQKo/K
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.kick.hazardsdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.kick.hazards -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.kick.hazardsdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.kick.hazards -
Acquires the wake lock 1 IoCs
Processes:
com.kick.hazardsdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.kick.hazards
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/Config/sys/apps/log/log-2024-04-21.txtFilesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
/storage/emulated/0/Config/sys/apps/log/log-2024-04-21.txtFilesize
25B
MD504f412407df2e4495f811906b6f817e7
SHA1a8dbd085774d1222c7c518d68556267d7ab781f3
SHA256b179c1083e6f3b6a12b5694fb230ae09e7c8757dbd55faee99dc0ba7dce7caff
SHA512664c8426569854e42568443cb0daaaba4517c93cbf4d8db8690e5a4665af7eeabd50de7f55f8df76fa8e6179c7ccbd6cc3c3d7888bcc6a7a8a093dae9a914526
-
/storage/emulated/0/Config/sys/apps/log/log-2024-04-21.txtFilesize
57B
MD550e1c2bc6c1606d70c4920da7b1d7b85
SHA1047f1eea0acba19e86ea9088515b40d01fcb1288
SHA256cf17ecd14a394333fd234bdb3e3dbb2b3f78bb538e2f713e9be3d359785b93ab
SHA5127c10939325ee2eaa3c85046c6dcabcd657dc3df316f2118186f48ab166829055c2782ec87388ad539963be1fd77331dbb439a70c7e33a1f9ae8b6a6f5e0ff317