Analysis
-
max time kernel
179s -
max time network
139s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
13-06-2024 05:42
Behavioral task
behavioral1
Sample
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763.apk
-
Size
760KB
-
MD5
37dd03ddca420a394191620ad235297a
-
SHA1
3be1b5e54d243429d69ea9680ca8fcaba6a63930
-
SHA256
b0124e835f590be27e975cbb586152601379675140ef1ccb9a7f052913ab0763
-
SHA512
c7361d7e93bab36d659d3f1d7806494441e0c2d11658891942424046bf33d3f509700004a50a704b7aac9e51d5c442a2f51c9e541c1bc3538a6288ac426576ad
-
SSDEEP
12288:KR86KC2ja1a8LdeUtyMkAJB5WmpYshXZPbGwidNpgu:KW6Ea1a6eUZkAJB5WmD9idNpR
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground cmf0.c3b5bm90zq.patch -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS cmf0.c3b5bm90zq.patch -
Tries to add a device administrator. 2 TTPs 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Intent action android.app.action.ADD_DEVICE_ADMIN cmf0.c3b5bm90zq.patch -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
cmf0.c3b5bm90zq.patchdescription ioc process Framework service call android.app.IActivityManager.registerReceiver cmf0.c3b5bm90zq.patch
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63B
MD50efbe7c5c278ffa0236f89a3d77bf97d
SHA112caed577e87cad826a6c1edc1ef3645c13668e7
SHA256edd9497280626e6b2af5e1f7cf7f20d2e122daf21ccbacb70af6d6663119ad77
SHA512625168922160e30653fce56ddd1e964aee1cac7adf86455f606e50d0ee2856bd593a1259fbdde8ad79bfb4abafcaaa840de9ca44f177e4afc27b8211c454442d
-
Filesize
230B
MD5e80c77d3ec29c6ec042e5fe1b20d2054
SHA1af74e17757ca0972e73291085e4c03f0c067ec3d
SHA256047d7a7204f30c386c1d3cd0e5847306962d235bb1676e0e8018c25877a1b254
SHA5128abc882d4b8306926c8db4f7f31b7fc7dd4ddbb220565c9718f688683b7581583afa1fee60e630ecf37ec9b63af3a73ba65baf6fa020637d0ae2573b8f206566