Analysis

  • max time kernel
    179s
  • max time network
    188s
  • platform
    android_x64
  • resource
    android-x64-20240514-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system
  • submitted
    31-05-2024 23:37

General

  • Target

    2d5e80f752608faa23f05e6558a695fcac261d78b9979d6746dc11dc995665e3.apk

  • Size

    4.6MB

  • MD5

    3c90ca08d834d4650409a4282bbe6d42

  • SHA1

    8698e712dc3ae9b2554f421d14e2d77323f0896a

  • SHA256

    2d5e80f752608faa23f05e6558a695fcac261d78b9979d6746dc11dc995665e3

  • SHA512

    085531b43425bd5e234bbd7f50c21a2c3f7a76870cf5bc91b8f74f90d05f76556bbc742fefd02ffbe76180c6f290c4afd595efed128af41da1356ec33eb91468

  • SSDEEP

    98304:w/lGJUYCfFbE1ybv0J6zhED0e9D0hD0cD0ErD0nAHD0PD08D0w7R:wgvmFbz0J6zhEDjDYDpDBDCiDWDlDT7R

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Prevents application removal 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to prevent removal.

  • Checks CPU information 2 TTPs 1 IoCs

    Checks CPU information which indicate if the system is an emulator.

  • Checks memory information 2 TTPs 1 IoCs

    Checks memory information which indicate if the system is an emulator.

  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Acquires the wake lock 1 IoCs

Processes

  • com.stiiceaidefa.newicon
    1⤵
    • Makes use of the framework's Accessibility service
    • Prevents application removal
    • Checks CPU information
    • Checks memory information
    • Makes use of the framework's foreground persistence service
    • Obtains sensitive information copied to the device clipboard
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Acquires the wake lock
    PID:5152

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.stiiceaidefa.newicon/files/db.db

    Filesize

    44KB

    MD5

    d5d190e1180c5e6858c40a93f7526f12

    SHA1

    0d054f2e34776c8d5bcfd54d743831b9919618fe

    SHA256

    274fe3e82fc2630d99809afd6a1c64768a77ed69c04b33e0df6a292a5a042203

    SHA512

    0d58df37359d6e35f02ef95e4edcfb05fac6c3bc57d1c3e56e49fa7b6c66aef3f99b383cb14dc5a01b52bc6a0d4685f275fb30279aa26e8339a5e0b8416ba85e

  • /data/data/com.stiiceaidefa.newicon/files/loading.gif

    Filesize

    121KB

    MD5

    7b38720a0352dffa26411726c72dd2b0

    SHA1

    b15e687f42abcdc12427f146a3115ef2259211f8

    SHA256

    2013f490d45638cada331b3474ed65b9a43cec60da773accc98332e58c06336d

    SHA512

    0df28f87da4f9beb3ca8c108f54021a2a1a1434771abbb5ba67a2736097f2287b05e5220a33e92c42ee13ecae1144714a422b986763712794f69e65bc44c83e3

  • /data/data/com.stiiceaidefa.newicon/files/txtscreensize.txt

    Filesize

    11B

    MD5

    1b65c10c6215685f9d621d797f911373

    SHA1

    cc50aaed5cd521a62ec8cf9fe0413153ec90f265

    SHA256

    2230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89

    SHA512

    5a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f