General
-
Target
8509cd3cada43f74b8b9a65719bd4f7c24efb605ae35369508ea35ea0fe53689
-
Size
14.0MB
-
Sample
240517-kgbf2ahf5y
-
MD5
2a3d2c35fd2dc6fb5a7d5a328b3bd529
-
SHA1
b102465ecd34bf5af39e5c3d7213dbd026be9c49
-
SHA256
8509cd3cada43f74b8b9a65719bd4f7c24efb605ae35369508ea35ea0fe53689
-
SHA512
b68525f7c522c9d2ab578d4c142bd16ed577f66437e65b7d6de5adef9d1f8e7f78f3eb6632921b9afcab443cab7846fe20a96006370228165e32a5103f5d197a
-
SSDEEP
393216:BjVsj2ku6XMmE0NiQF7Iy+h0VkQ2G6kIRrvH6J0KG:BPQE0N/Qh0VX2GvYT6J0KG
Static task
static1
Behavioral task
behavioral1
Sample
8509cd3cada43f74b8b9a65719bd4f7c24efb605ae35369508ea35ea0fe53689.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
8509cd3cada43f74b8b9a65719bd4f7c24efb605ae35369508ea35ea0fe53689.apk
Resource
android-33-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
8509cd3cada43f74b8b9a65719bd4f7c24efb605ae35369508ea35ea0fe53689
-
Size
14.0MB
-
MD5
2a3d2c35fd2dc6fb5a7d5a328b3bd529
-
SHA1
b102465ecd34bf5af39e5c3d7213dbd026be9c49
-
SHA256
8509cd3cada43f74b8b9a65719bd4f7c24efb605ae35369508ea35ea0fe53689
-
SHA512
b68525f7c522c9d2ab578d4c142bd16ed577f66437e65b7d6de5adef9d1f8e7f78f3eb6632921b9afcab443cab7846fe20a96006370228165e32a5103f5d197a
-
SSDEEP
393216:BjVsj2ku6XMmE0NiQF7Iy+h0VkQ2G6kIRrvH6J0KG:BPQE0N/Qh0VX2GvYT6J0KG
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Reads the contacts stored on the device.
-
Reads the content of the call log.
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1