Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
07-05-2024 17:45
Behavioral task
behavioral1
Sample
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
-
Size
8.5MB
-
MD5
826f773160d410911f1264d9ae18b257
-
SHA1
052d5b51a2f8dc24b9e124dadd24e6eb229e9f9f
-
SHA256
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71
-
SHA512
62a7805dc99c2c9541f7de7379db8a41207024098387e814206f29de503b5957ab18936be0d8bdfff9499a18c47914e399a698c10ff887d580cff2db366c0ad7
-
SSDEEP
98304:osKfC9rzuhTeHp8TDaoWSW+mz3zBzTb0tgSD:08vA/WSKzJEj
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText goal.oxygen.critical Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId goal.oxygen.critical Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId goal.oxygen.critical -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
goal.oxygen.criticaldescription ioc process File opened for read /proc/cpuinfo goal.oxygen.critical -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
goal.oxygen.criticaldescription ioc process File opened for read /proc/meminfo goal.oxygen.critical -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.app.IActivityManager.setServiceForeground goal.oxygen.critical -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone goal.oxygen.critical -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.app.IActivityManager.registerReceiver goal.oxygen.critical -
Acquires the wake lock 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock goal.oxygen.critical -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo goal.oxygen.critical -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS goal.oxygen.critical -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.app.job.IJobScheduler.schedule goal.oxygen.critical
Processes
-
goal.oxygen.critical1⤵
- Makes use of the framework's Accessibility service
- Checks CPU information
- Checks memory information
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4283
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21B
MD5e70067fad5cc8b92294faa5435575498
SHA10a4ee149844f51240099789d7b6bae1c5eca1e20
SHA2564dfad23d7b5eb1b05b12aea597983d33d744492441b9a748b1b68efe58027949
SHA512f102dd1cbdc19c92ec3b448c6a19030b3462e8f196830b140da01a3dce5756f3700f74c376ee189f917e033a43b3a495f815a341e3e875e9a2628a009b1e0e3b
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
272B
MD525bd3b7caa8d025727f63b1eaf7c85fb
SHA1a7eac2a09dafcf6197565db4f8fef8bfdbe308c5
SHA256f7a61cdeb8aa8a11ab64a579b015e9658cc915fb7eec10421cb29b17514f3e64
SHA5125811370e343a128d1f363b655c18deea7f5079402be9e85b708df361f569cbd879c5fdf2c366df8e5a47b3098e0ad69f84483a3266d645fa9d7ef07753a36f4c
-
Filesize
29B
MD5d26a38d006eb68995f4898c7d3110a54
SHA10b98f9fee1d85ae1b66d454011f813ee24b22eee
SHA2564ad6fda7aa7e99098a28b30c6192e86f2ff8490c27453df2e2a2cd705b8f5c0e
SHA5128b70446e3a76a7b3027eca546b682acc207a5e04bcad20dad483294467f6a2551f0f0450dc7cc78d691acba08db6d43135c2e8a33e6eebf1ab2a24cdcecbcd6e