General
-
Target
25253744c33ab516d6731f8002e8fe590560b3c4d250acd19bad8eab46adfef7.apk
-
Size
7.0MB
-
Sample
240509-q9shxaga24
-
MD5
015fb1c3b18f860a54e0200180bf3fe0
-
SHA1
d522525c3978c0b800f076c1f11c3b86fa81a594
-
SHA256
25253744c33ab516d6731f8002e8fe590560b3c4d250acd19bad8eab46adfef7
-
SHA512
226f4f80a97b2e13de840f5c4aa9a8f7038d2f9285fbe244cced749ccf0a043b4535963cb474a50e595f8310dbae1e87de5cef86b7b27eef1e6273cef3f3c054
-
SSDEEP
196608:hOFHYvVJnmf0n8BhsUsa0K4tlsG7wzbk1Zn5zuSN:hOFHYznA0nuFsa0rlsGMzYbR7
Static task
static1
Behavioral task
behavioral1
Sample
25253744c33ab516d6731f8002e8fe590560b3c4d250acd19bad8eab46adfef7.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
25253744c33ab516d6731f8002e8fe590560b3c4d250acd19bad8eab46adfef7.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
25253744c33ab516d6731f8002e8fe590560b3c4d250acd19bad8eab46adfef7.apk
Resource
android-x64-arm64-20240506-en
Malware Config
Targets
-
-
Target
25253744c33ab516d6731f8002e8fe590560b3c4d250acd19bad8eab46adfef7.apk
-
Size
7.0MB
-
MD5
015fb1c3b18f860a54e0200180bf3fe0
-
SHA1
d522525c3978c0b800f076c1f11c3b86fa81a594
-
SHA256
25253744c33ab516d6731f8002e8fe590560b3c4d250acd19bad8eab46adfef7
-
SHA512
226f4f80a97b2e13de840f5c4aa9a8f7038d2f9285fbe244cced749ccf0a043b4535963cb474a50e595f8310dbae1e87de5cef86b7b27eef1e6273cef3f3c054
-
SSDEEP
196608:hOFHYvVJnmf0n8BhsUsa0K4tlsG7wzbk1Zn5zuSN:hOFHYznA0nuFsa0rlsGMzYbR7
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Requests enabling of the accessibility settings.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1