Analysis
-
max time kernel
154s -
max time network
163s -
platform
android_x64 -
resource
android-x64-20240506-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240506-enlocale:en-usos:android-10-x64system -
submitted
07-05-2024 17:45
Behavioral task
behavioral1
Sample
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71.apk
-
Size
8.5MB
-
MD5
826f773160d410911f1264d9ae18b257
-
SHA1
052d5b51a2f8dc24b9e124dadd24e6eb229e9f9f
-
SHA256
dfaae61c292ef05981dc62f71dce4fbd4d8f0f5bc19c4f4bc739c5ea25acbb71
-
SHA512
62a7805dc99c2c9541f7de7379db8a41207024098387e814206f29de503b5957ab18936be0d8bdfff9499a18c47914e399a698c10ff887d580cff2db366c0ad7
-
SSDEEP
98304:osKfC9rzuhTeHp8TDaoWSW+mz3zBzTb0tgSD:08vA/WSKzJEj
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId goal.oxygen.critical Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText goal.oxygen.critical Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId goal.oxygen.critical -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
goal.oxygen.criticaldescription ioc process File opened for read /proc/cpuinfo goal.oxygen.critical -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
goal.oxygen.criticaldescription ioc process File opened for read /proc/meminfo goal.oxygen.critical -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.app.IActivityManager.setServiceForeground goal.oxygen.critical -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener goal.oxygen.critical -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone goal.oxygen.critical -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.app.IActivityManager.registerReceiver goal.oxygen.critical -
Acquires the wake lock 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock goal.oxygen.critical -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo goal.oxygen.critical -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
goal.oxygen.criticaldescription ioc process Framework service call android.app.job.IJobScheduler.schedule goal.oxygen.critical
Processes
-
goal.oxygen.critical1⤵
- Makes use of the framework's Accessibility service
- Checks CPU information
- Checks memory information
- Makes use of the framework's foreground persistence service
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
- Schedules tasks to execute at a specified time
PID:5229
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21B
MD5e70067fad5cc8b92294faa5435575498
SHA10a4ee149844f51240099789d7b6bae1c5eca1e20
SHA2564dfad23d7b5eb1b05b12aea597983d33d744492441b9a748b1b68efe58027949
SHA512f102dd1cbdc19c92ec3b448c6a19030b3462e8f196830b140da01a3dce5756f3700f74c376ee189f917e033a43b3a495f815a341e3e875e9a2628a009b1e0e3b
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
272B
MD5a8ba656f26d70a4d78027f5ffa6d21a7
SHA1af5af254dccffd44094e29b5f43650e079a9ef17
SHA25696b456f590d8898b91f73adee438155b2eb8490ad8bc38a01440ac4bf827389f
SHA5125aaf81b4f16a0fa5f88f8157a0e636cb5531952275af7ba5f6ff53de544d5309341426a85bb407a4ee549daf8193e67c81c681e3b3cd1f1b3536a9874627e69d
-
Filesize
29B
MD5d26a38d006eb68995f4898c7d3110a54
SHA10b98f9fee1d85ae1b66d454011f813ee24b22eee
SHA2564ad6fda7aa7e99098a28b30c6192e86f2ff8490c27453df2e2a2cd705b8f5c0e
SHA5128b70446e3a76a7b3027eca546b682acc207a5e04bcad20dad483294467f6a2551f0f0450dc7cc78d691acba08db6d43135c2e8a33e6eebf1ab2a24cdcecbcd6e