Analysis
-
max time kernel
179s -
max time network
185s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
07-07-2024 22:04
Behavioral task
behavioral1
Sample
a7c5e7d22e4638fd83c45791225be170c7c84f4a3fc1ab0af2c42ef6ee9b51d9.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a7c5e7d22e4638fd83c45791225be170c7c84f4a3fc1ab0af2c42ef6ee9b51d9.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a7c5e7d22e4638fd83c45791225be170c7c84f4a3fc1ab0af2c42ef6ee9b51d9.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a7c5e7d22e4638fd83c45791225be170c7c84f4a3fc1ab0af2c42ef6ee9b51d9.apk
-
Size
1.5MB
-
MD5
611bc7da4477b3e697dc9897334675bb
-
SHA1
7038b40d406b4a91cbd2c6cf6e0d7ac5cd157979
-
SHA256
a7c5e7d22e4638fd83c45791225be170c7c84f4a3fc1ab0af2c42ef6ee9b51d9
-
SHA512
7b5309464525db9b3e205f12d51544e8d2d08359b4ce4a71445edae6972e2e5c8d485876e742fd50a8464b19e89ed3b225c6f63a67353620bea05378b7ed8052
-
SSDEEP
24576:J+WWTuBeOFGO7VQXHoGy1CQmKhAtK8lK/kF8QYnp703kkCCL4HgLn28:JDaoz/7VCHt0Ckhq2sFxYnSk/CL/n28
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
sampop.sampo.sampdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId sampop.sampo.samp -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
sampop.sampo.sampdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock sampop.sampo.samp -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
sampop.sampo.sampdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground sampop.sampo.samp -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
sampop.sampo.sampdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo sampop.sampo.samp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
sampop.sampo.sampdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone sampop.sampo.samp -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
sampop.sampo.sampdescription ioc process Framework service call android.app.IActivityManager.registerReceiver sampop.sampo.samp -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
sampop.sampo.sampdescription ioc process Framework API call javax.crypto.Cipher.doFinal sampop.sampo.samp
Processes
-
sampop.sampo.samp1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
PID:4945
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1