Analysis
-
max time kernel
172s -
max time network
181s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
14-05-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
8e9b27cc54ffa056a203371a86c8e27dac6ed4fa7be8bc2b6f1fc1d591a7df83.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8e9b27cc54ffa056a203371a86c8e27dac6ed4fa7be8bc2b6f1fc1d591a7df83.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
8e9b27cc54ffa056a203371a86c8e27dac6ed4fa7be8bc2b6f1fc1d591a7df83.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
8e9b27cc54ffa056a203371a86c8e27dac6ed4fa7be8bc2b6f1fc1d591a7df83.apk
-
Size
116KB
-
MD5
b933e9192a92011eaf3c146be52c28ee
-
SHA1
a6696713b7e99c4ce51510f18f22b7da81438ba2
-
SHA256
8e9b27cc54ffa056a203371a86c8e27dac6ed4fa7be8bc2b6f1fc1d591a7df83
-
SHA512
477aafec5e1b708b22b6558594c2c35fb2fb70774130197ee8b5813fe0a5cbc3a9b499742d26352f3eb6c014d95c5ca3e03cb1f52fd1c7ffa71b52902e9937d5
-
SSDEEP
3072:VjXlQPLcr1II8by7xgOynwKx8cjm1HeyL:LQPLcnjxEnlXjcFL
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId fuqd.ychua.fcej Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId fuqd.ychua.fcej -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction fuqd.ychua.fcej -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/fuqd.ychua.fcej/[email protected] 4621 fuqd.ychua.fcej /data/user/0/fuqd.ychua.fcej/files/Factory/Plugins/buic.dex 4621 fuqd.ychua.fcej /data/user/0/fuqd.ychua.fcej/files/Factory/Plugins/buic.dex 4621 fuqd.ychua.fcej -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground fuqd.ychua.fcej -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS fuqd.ychua.fcej -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock fuqd.ychua.fcej -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS fuqd.ychua.fcej
Processes
-
fuqd.ychua.fcej1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
- Requests enabling of the accessibility settings.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4621
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/fuqd.ychua.fcej/[email protected]
Filesize171KB
MD541e3c934cea82234e9621e09cbbc50fe
SHA14a10dc6583755a0aa9cdc536f736fe72e5b4668e
SHA256f3d5773496372f55681c84b1a28cbd528f2421e8b1920a15a31314f7f0678846
SHA5123a3c853c1dcefdf5112d0461c783758efaaa4876ddb37231228fc77611c45b02624d171e383d087d1169cf5fefca18cc689065bcbd979966ea6d96aaa8a299d0
-
Filesize
173B
MD554998c5264cb30f76f8c50a89950c419
SHA149698d8188f82dab89f6a9f2cd91161812981a96
SHA256cf91f23b46ee74dfa75d80256dd9b08bc5bdab18532947f1e705a2f1791ad63b
SHA512af25e8900818b2329975f378e935abaf8f41a2d2654d163c912568346a92e6c1785e1d14adb7fb768845510fe4fe7e53aa5f5d244d687c71578fb45b1c0c882a
-
/data/user/0/fuqd.ychua.fcej/oat/x86_64/[email protected]
Filesize397B
MD56b7f05b2fdbbb93f0ac40b9bf8985f30
SHA19e84cda7e02cad0a8497ff60dce3403764a1a28c
SHA256960177f5b1c56df450da54b3a9322e2ca06e1b028b0ff48273861865a4996e64
SHA512773abef8afec7e7040dee552864d28ef32e2296f1ed6e5637c5736b3dd81889b15b91ce1a2f69b7ff21ac35c6034dad607f8e8c6a452a6f3ac69f92541235531