Resubmissions
16-05-2024 13:59
240516-ravpnagc75 1016-05-2024 08:38
240516-kj4wcscg97 1016-05-2024 08:34
240516-kgtbvacg22 1016-05-2024 08:28
240516-kc4a9ace43 1015-05-2024 07:41
240515-jjgv6aff67 10Analysis
-
max time kernel
179s -
max time network
184s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
15-05-2024 07:41
Behavioral task
behavioral1
Sample
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
-
Size
4.6MB
-
MD5
f54c526d2937c59a44577fdb9852e793
-
SHA1
10a9ec85a15c0653cbdd368dafa71527825c4f4e
-
SHA256
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84
-
SHA512
71c5b163c0fab875b79485a6eb42ea52aec0ca0c38b3eab4ffa52638e8b26a99edc26d8a689bb6d5b762807e8099891c3e33a1eb74e215b9519c7769c6801891
-
SSDEEP
98304:CkKdcW23OljvSyC28qG1VNBD0eoD0YD0ND0E+D0nAmD0aD0BD0HWW:ydcW23O56b28qGTNBDmDZDYDUDCjDrDf
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.estifrumix.newicondescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.estifrumix.newicon Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.estifrumix.newicon -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
com.estifrumix.newicondescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.estifrumix.newicon -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.estifrumix.newicondescription ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.estifrumix.newicon -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.estifrumix.newicondescription ioc Process File opened for read /proc/cpuinfo com.estifrumix.newicon -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.estifrumix.newicondescription ioc Process File opened for read /proc/meminfo com.estifrumix.newicon -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.estifrumix.newicondescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.estifrumix.newicon -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.estifrumix.newicondescription ioc Process Framework service call android.app.IActivityManager.registerReceiver com.estifrumix.newicon -
Acquires the wake lock 1 IoCs
Processes:
com.estifrumix.newicondescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.estifrumix.newicon
Processes
-
com.estifrumix.newicon1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Checks CPU information
- Checks memory information
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
PID:4270
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5d5d190e1180c5e6858c40a93f7526f12
SHA10d054f2e34776c8d5bcfd54d743831b9919618fe
SHA256274fe3e82fc2630d99809afd6a1c64768a77ed69c04b33e0df6a292a5a042203
SHA5120d58df37359d6e35f02ef95e4edcfb05fac6c3bc57d1c3e56e49fa7b6c66aef3f99b383cb14dc5a01b52bc6a0d4685f275fb30279aa26e8339a5e0b8416ba85e
-
Filesize
4KB
MD52c6fe773f7cc42d162630d93a98fa91f
SHA1a0d76f9403df661aea3017a0d912de03c415e3a9
SHA2563855acc95e1e3648649a16c91abdcb1e2eb81826ae6171a0ab25c5b74452f186
SHA51220436ab982d11ec32d69267c93c378e4ad92d8f840f5b412984af5aa0240f0eb8df757fdfde5ab95a2649c6f9862d9b633cd8dfcab5c07c1a4533072600c39a6
-
Filesize
4KB
MD53d51c7100e71b79077835fb3b337959b
SHA1adff8c3f297cd1400cf453d26935c9f90fdec2e1
SHA25662d7832bac7796103a7dd606e1b853b11e6870b6ff7aaf6866e7e08c475e49cd
SHA512250bcbd4672aa65d8253d06288623d5fcd902824bbd68f435e2002e340312aa3132cbd51ee0d780ff37634146af9c291bfa7f08932428e0764746e7ef9d2ea68
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
121KB
MD57b38720a0352dffa26411726c72dd2b0
SHA1b15e687f42abcdc12427f146a3115ef2259211f8
SHA2562013f490d45638cada331b3474ed65b9a43cec60da773accc98332e58c06336d
SHA5120df28f87da4f9beb3ca8c108f54021a2a1a1434771abbb5ba67a2736097f2287b05e5220a33e92c42ee13ecae1144714a422b986763712794f69e65bc44c83e3
-
Filesize
11B
MD51b65c10c6215685f9d621d797f911373
SHA1cc50aaed5cd521a62ec8cf9fe0413153ec90f265
SHA2562230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89
SHA5125a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f