Analysis

  • max time kernel
    1809s
  • max time network
    1814s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    21-04-2024 14:24

General

  • Target

    ypA3Wwq.apk

  • Size

    4.5MB

  • MD5

    df71b9a448eb918ca6720e14b5c5d772

  • SHA1

    045c5f0367043e214c9f889ae1b21f1550648c6f

  • SHA256

    ffc417297b1e348c69930abde0a93f0a2aa55afc0222fe3052d309c70451da7b

  • SHA512

    42815e0859ffd8b08d0283cab92ac7c76b77121a03aee36831215232052c3e013d7613d360eb1de1153cf508ba53b6bb20af07fd9d789ab4a581d103833ce1a8

  • SSDEEP

    98304:EPthoqu9nseE56hBnPdKYNA7mzFzBsT10twRNwkinn:otGRMshFk8zQKo/K

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs

Processes

  • com.kick.hazards
    1⤵
    • Makes use of the framework's Accessibility service
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    PID:5090

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2024-04-21.txt
    Filesize

    13B

    MD5

    de2c41a51ee9246eb1708f65b511add0

    SHA1

    2f442d634c8a18760a232c8829d4b5d74a52f074

    SHA256

    ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab

    SHA512

    7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a

  • /storage/emulated/0/Config/sys/apps/log/log-2024-04-21.txt
    Filesize

    25B

    MD5

    04f412407df2e4495f811906b6f817e7

    SHA1

    a8dbd085774d1222c7c518d68556267d7ab781f3

    SHA256

    b179c1083e6f3b6a12b5694fb230ae09e7c8757dbd55faee99dc0ba7dce7caff

    SHA512

    664c8426569854e42568443cb0daaaba4517c93cbf4d8db8690e5a4665af7eeabd50de7f55f8df76fa8e6179c7ccbd6cc3c3d7888bcc6a7a8a093dae9a914526

  • /storage/emulated/0/Config/sys/apps/log/log-2024-04-21.txt
    Filesize

    57B

    MD5

    50e1c2bc6c1606d70c4920da7b1d7b85

    SHA1

    047f1eea0acba19e86ea9088515b40d01fcb1288

    SHA256

    cf17ecd14a394333fd234bdb3e3dbb2b3f78bb538e2f713e9be3d359785b93ab

    SHA512

    7c10939325ee2eaa3c85046c6dcabcd657dc3df316f2118186f48ab166829055c2782ec87388ad539963be1fd77331dbb439a70c7e33a1f9ae8b6a6f5e0ff317