General
-
Target
d59a4848b584fdd93eb3d0b554a8df58.bin
-
Size
1.2MB
-
Sample
240503-b8bfnsca8s
-
MD5
b8ea0bbaaf9ea094c3963cbab3cdd2e7
-
SHA1
910ca707077c9b73a92e1d508c9415e5b71fbf38
-
SHA256
8d771b6c61479c87bcdb257351f7a9290bc4adf2f3d20a047fc256c149e931a2
-
SHA512
a520fc33afce149af95d93e31d5b2ef6093a4e5711715a55d2b249f265d6afd95f4611de2105bf1d9a1b2f91c2a70c0b750000e7d259aa4d40614a68d64335c3
-
SSDEEP
24576:jVH2bAzfiEyUBl3b+C0TFAN0D8YK/Xs8nQ0vsUUTXIgPK9v3y:WUfFyUBlLlYAEU6jS9fy
Behavioral task
behavioral1
Sample
32e4dee58ea17addc5df4ffb862ab3a8df1697598cb6437f92de4075665812c2.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
32e4dee58ea17addc5df4ffb862ab3a8df1697598cb6437f92de4075665812c2.apk
Resource
android-x64-20240221-en
Malware Config
Targets
-
-
Target
32e4dee58ea17addc5df4ffb862ab3a8df1697598cb6437f92de4075665812c2.zip
-
Size
1.4MB
-
MD5
d59a4848b584fdd93eb3d0b554a8df58
-
SHA1
c60756e85bc596c61fdd4caf3fec9a0d995c4274
-
SHA256
32e4dee58ea17addc5df4ffb862ab3a8df1697598cb6437f92de4075665812c2
-
SHA512
2c34e5cac3ef7063f5ce145975b6fdd025753005b6352d1f2b83aac9c7cfd15f3e065dffb4aab9c1815626277d8c28ade94e5d7ae8803d7349a9f573fe6a0ee8
-
SSDEEP
24576:UsMX7QNP9BBPhW70qVZybbQe7mPbDYxNR18jregpfOV/4zgdfw:UjodEIqqXQe7ag/8regpfWzd4
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1