General
-
Target
7cb3522f42f53efc20d592dd98d112aa.apk
-
Size
6.2MB
-
Sample
240613-tv917awdma
-
MD5
7cb3522f42f53efc20d592dd98d112aa
-
SHA1
e7599da1e870744d6ac71cbf014bc786594c85c7
-
SHA256
038959745351306c0527ae0441f92feea12847a98e0bb01507fcbb406bb457a2
-
SHA512
6202b31aa671b5b3a62d5f262710ffb24af80c71051f6584e253656b06849aaa7016a1b3e677cd6db42b356cf99bf0f043cc34a029a57591a44fef06c3d299c1
-
SSDEEP
196608:ZsT4kBNSrVpR/AFScn8XzKDvVtWMzDvrQ:6NBNE/c8Xz0vSqrQ
Static task
static1
Behavioral task
behavioral1
Sample
7cb3522f42f53efc20d592dd98d112aa.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
7cb3522f42f53efc20d592dd98d112aa.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
7cb3522f42f53efc20d592dd98d112aa.apk
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
7cb3522f42f53efc20d592dd98d112aa.apk
-
Size
6.2MB
-
MD5
7cb3522f42f53efc20d592dd98d112aa
-
SHA1
e7599da1e870744d6ac71cbf014bc786594c85c7
-
SHA256
038959745351306c0527ae0441f92feea12847a98e0bb01507fcbb406bb457a2
-
SHA512
6202b31aa671b5b3a62d5f262710ffb24af80c71051f6584e253656b06849aaa7016a1b3e677cd6db42b356cf99bf0f043cc34a029a57591a44fef06c3d299c1
-
SSDEEP
196608:ZsT4kBNSrVpR/AFScn8XzKDvVtWMzDvrQ:6NBNE/c8Xz0vSqrQ
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about active data network
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1