Analysis
-
max time kernel
179s -
max time network
188s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
26-05-2024 00:07
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral2
Sample
ready.apk
Resource
android-33-x64-arm64-20240514-en
General
-
Target
ready.apk
-
Size
8.5MB
-
MD5
db209ee2d6b9cf5579d0ad0b064a7064
-
SHA1
11f974a6ab2c51835e104acd38773d49edb5bed6
-
SHA256
4b7ce3bf155c17636a7ea6684930e5314d5a5687d0e0fe58d95f747f1cd2f415
-
SHA512
e974732317c5500932176fc3dc56bd60bff091cd6815bb56010536d23172adb461ca4fe4b78484c2e1e855f9a3a22ff0284bd3552b7d3b8a8596e8ab55aa5c5f
-
SSDEEP
98304:b3rC2IxQ2IaohJfIH9DFCmzfzB4TA0tgUU:bbCXxQphJqBtzSrU
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
kingdom.previously.haydescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId kingdom.previously.hay Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText kingdom.previously.hay Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId kingdom.previously.hay -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
kingdom.previously.haydescription ioc process Framework service call android.app.IActivityManager.setServiceForeground kingdom.previously.hay -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock 1 IoCs
Processes:
kingdom.previously.haydescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock kingdom.previously.hay -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
kingdom.previously.haydescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo kingdom.previously.hay -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
kingdom.previously.haydescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS kingdom.previously.hay -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
kingdom.previously.haydescription ioc process Framework service call android.app.job.IJobScheduler.schedule kingdom.previously.hay
Processes
-
kingdom.previously.hay1⤵
- Makes use of the framework's Accessibility service
- Checks CPU information
- Checks memory information
- Makes use of the framework's foreground persistence service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Checks if the internet connection is available
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/Config/sys/apps/log/log-2024-05-26.txtFilesize
33B
MD567bcc37a9b6aa7a023fcdd514f7670e8
SHA18545df8b54081ccc21fb117c107226107af02680
SHA256e174bd88d346084a09a8a7a725a58454c707259aa36beac5bd83f850cf1503c5
SHA512756aef13b043f8e5fe4c48c948b1aa949fe4e5bf4e833292ae736e1b94eaded3aa0fa08339f8d9246a7cf10a0a78b9b78c871a1fc2eef5c3593a904809bc5b01
-
/storage/emulated/0/Config/sys/apps/log/log-2024-05-26.txtFilesize
25B
MD529c860eaf6f36678345f0a9f6b9cc0d9
SHA17ffbfbc250be31fd70760cb9f0536e6e4f45c6ef
SHA256a1ea0cecec3d74e34e9874060753be7786995c8cc62e1daa420f930122f43eec
SHA512290f920dbee3dd59bd258ec398f0816ee24a620392ce8deaad0e6d1eaa1208f891393522d8125aea4aef9163f9011a02b3463e2d41a4e24bde065fcbad57ed20
-
/storage/emulated/0/Config/sys/apps/log/log-2024-05-26.txtFilesize
57B
MD5a9ec0c42a43c72d73c499e5c17ccbb8b
SHA1731652fbfe61eac3fdb4b9d3e2eaa010848a0906
SHA2566c5309ce3f31c9af3288b0de3305b7f5ddee97be60ca4ac1184f3c334480c05b
SHA5125f8ed24a51f68cfa0627aceb9190d3a7febaee61bd5a89898ab113ddaa7ce2a41f129a28c4e200d5e5e4ddff7a483abc0393dc38e870782caf1c46d2ec0df2e3
-
/storage/emulated/0/Config/sys/apps/log/log-2024-05-26.txtFilesize
33B
MD5365f074d64faad2f0f0c7784608e5b57
SHA12105b80d01621cbd370bec93f73709a7b67d565b
SHA2560c4662ed55fc03738e7903864ed0249c921b8f2d858531577eebd53501237cc4
SHA512d29b5c16d10a78b386ba1f4882f7e80bc6d41887671abe6a36c746b015ea280d4a26f3d2af323b4ad755c256e5851a5b95d0bda8882c6c0a2c125bc748fab47a
-
/storage/emulated/0/Config/sys/apps/log/log-2024-05-26.txtFilesize
57B
MD53af69119804d1d999d56d230338ffd36
SHA169350826205583c8acc385ee0a6e3fc2673ee2ca
SHA25610994862cb263ab6b1e4428cc24cc9c585458fc67544fe0f5dfea81a5a7a115c
SHA5124a41b19d28f637b397d9dff225621694c44c750a9bd65f3e6ad5d3b9acf0d118910ddf53d4618213f9e14c61e0fb154f33f2747dd3b8d50459990767f42fc8cb