Analysis

  • max time kernel
    179s
  • max time network
    182s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240514-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240514-enlocale:en-usos:android-13-x64system
  • submitted
    26-05-2024 00:58

General

  • Target

    ready.apk

  • Size

    8.5MB

  • MD5

    17c7bba4f79e5deea857fd523f432124

  • SHA1

    2d8a5f60cfae666240c84201078e74a645b9a3b7

  • SHA256

    210d54a1c9ecec57fc36c46e53f18f69953c55f56a559bf144af69f8b67afa08

  • SHA512

    59e5fbd2ed2f9fb566b8808d7e47277c5dcf953595e89464521ca13487c319770a34b467ba2924d56265a65d94623bad45207d497cccfffa9540f75ca8af3641

  • SSDEEP

    49152:Dq0xuzatfr4LVPxct8ACWELIdGWkCcqAmz+zdGGPQTOfTUbYqp0cgcbxAh9V:zuC4LV5cmAEZWkxFmz+zBoTh0tc2V

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Acquires the wake lock 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • cologne.chicago.vertical
    1⤵
    • Makes use of the framework's Accessibility service
    • Makes use of the framework's foreground persistence service
    • Acquires the wake lock
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Schedules tasks to execute at a specified time
    PID:4285

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2024-05-26.txt
    Filesize

    25B

    MD5

    29c860eaf6f36678345f0a9f6b9cc0d9

    SHA1

    7ffbfbc250be31fd70760cb9f0536e6e4f45c6ef

    SHA256

    a1ea0cecec3d74e34e9874060753be7786995c8cc62e1daa420f930122f43eec

    SHA512

    290f920dbee3dd59bd258ec398f0816ee24a620392ce8deaad0e6d1eaa1208f891393522d8125aea4aef9163f9011a02b3463e2d41a4e24bde065fcbad57ed20

  • /storage/emulated/0/Config/sys/apps/log/log-2024-05-26.txt
    Filesize

    29B

    MD5

    b9b530e2448252311640bbecb69b796a

    SHA1

    215ede46fb42a68a7ae84c3019acb3019668a46c

    SHA256

    5a290151305de1ec4f790cd8ada8bd68c076a2c4ed497c40a519509659b65150

    SHA512

    5834499307946d130887067b2f837ddfef7fdfe3a7e5ed8977eb14c2dc1ab328334da35ed4c978e20b3e6b28ff30dbd12f0430f4b7c831481f339d360c260919