General
-
Target
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
-
Size
4.6MB
-
Sample
240516-kj4wcscg97
-
MD5
f54c526d2937c59a44577fdb9852e793
-
SHA1
10a9ec85a15c0653cbdd368dafa71527825c4f4e
-
SHA256
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84
-
SHA512
71c5b163c0fab875b79485a6eb42ea52aec0ca0c38b3eab4ffa52638e8b26a99edc26d8a689bb6d5b762807e8099891c3e33a1eb74e215b9519c7769c6801891
-
SSDEEP
98304:CkKdcW23OljvSyC28qG1VNBD0eoD0YD0ND0E+D0nAmD0aD0BD0HWW:ydcW23O56b28qGTNBDmDZDYDUDCjDrDf
Behavioral task
behavioral1
Sample
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84.apk
-
Size
4.6MB
-
MD5
f54c526d2937c59a44577fdb9852e793
-
SHA1
10a9ec85a15c0653cbdd368dafa71527825c4f4e
-
SHA256
cad56908abd1508451a5af4a5304de092f0342ec6a24bbbeb9b3988683483c84
-
SHA512
71c5b163c0fab875b79485a6eb42ea52aec0ca0c38b3eab4ffa52638e8b26a99edc26d8a689bb6d5b762807e8099891c3e33a1eb74e215b9519c7769c6801891
-
SSDEEP
98304:CkKdcW23OljvSyC28qG1VNBD0eoD0YD0ND0E+D0nAmD0aD0BD0HWW:ydcW23O56b28qGTNBDmDZDYDUDCjDrDf
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
MITRE ATT&CK Mobile v15
Defense Evasion
Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1