Analysis
-
max time kernel
150s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240221-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240221-enlocale:en-usos:android-9-x86system -
submitted
22/04/2024, 15:23
Behavioral task
behavioral1
Sample
123.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
123.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
123.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
123.apk
-
Size
728KB
-
MD5
ed50ee1a0d62659e47d3a2c96d41ed70
-
SHA1
30763093d9f89e4e888d14fb82084d503e9c6588
-
SHA256
ce2a872bd0c05cf4b0dc890b84f83ce44ce7cfd51be1e5b06c520c342de56bb8
-
SHA512
b8377ad2d3d2018052e110467aeba736115704c3f8287b939a86d2cedd642ca02069817546156d86da80cda8f40dc97235f6758376bf09928181ade64981a8da
-
SSDEEP
12288:0ylrYHLbPr19trCNhGUd1w154JMGRiusT3cgtN0Frm/6Rq21OgHsWVfrVQsZtWDq:0owpjeNhzd1wmPAHT3SFrm/GNLfjQbN0
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.appser.verapp Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.appser.verapp -
pid Process 4248 com.appser.verapp -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.appser.verapp -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.appser.verapp -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.appser.verapp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.appser.verapp -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.appser.verapp -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.appser.verapp -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.appser.verapp -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.appser.verapp
Processes
-
com.appser.verapp1⤵
- Makes use of the framework's Accessibility service
- Removes its main activity from the application launcher
- Checks CPU information
- Checks memory information
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests enabling of the accessibility settings.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4248
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5838e4d37ab5381226b80669f53b6cdf8
SHA1bd3abf77a889bb815309a466b8513565822dcc71
SHA256fc6f55e7c3453eb232c72dbbb79e66872efdcaa5c26f23421e08b0e5e7ebfc1e
SHA51240072caf9331b2ba507a29df33666bca9dcb9369a37414a701893265a45db99ce0e4c4d2e04080ec5e315a854d11f18a42854d5912d63c807602deab22a1c091
-
Filesize
20B
MD510912098551035eda31247c3874768dc
SHA1be92f15c841834098fa79d5d8f24a3c6312e281d
SHA2562c933e5483805e094032598e3013cdd0fefb8f6fcfb846104a5177348d88328e
SHA51290301e3cd5c454ce8b2051471966e3d64190318cd8d99710ad257fb8b22826d6e51db55e73a29af61a027ee4aa7b7ba57a418192dfc37b26e790158f87ea7a68
-
Filesize
20B
MD550a7bebf1e8745a1ae446156a38f8d43
SHA17bfd95c0385184c27a167c94ec34c339c5fe3aea
SHA2567108981be72a47a7cb20a3eeb0823b5cbefe35fcc2ba2fbebc164178435b72a8
SHA512e04dead96ad3247aa3cb860c58464723356ed77dca48b4491797923b46c46caa56aab75f2a7d4ea40201c5003bf7777081b58c54f8ea93c9a6dc096de9657fa2
-
Filesize
36B
MD544abbff4966121dce248678525d33bea
SHA1bc3259c60f8bdad0e950f4f960cd895a1c007769
SHA25642cfbc29439b1ba6ce656d375cf28baf58dfe183bc7395970971ac9de3504faa
SHA512300b446925a137c5c5501df53fa6d0550481bc6da8bbe0b2449d3caca0e37032b918e7ae87a45f717d0dbecfe65239f492b89fc2e77b49c6beb0ce3dd545c5b2
-
Filesize
271B
MD597bdb975f203cb21d852103282a0f8bd
SHA17aa600df007627b2267381764442746a7221056a
SHA256fdff2994efd5a31208ed41a159e8cb8ce9d89be7a1a0a77840d97ef987d2b74a
SHA512ded8c9b6aac1a47c128e2561ed99ea278875d226ce47bedd7f58faa33389be1da5aa92216cf5ee0167c0b6aadc19af4074ee1ffa1f5d96ab54118aa0e0c68b04