Analysis
-
max time kernel
179s -
max time network
170s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
24-07-2024 10:18
Behavioral task
behavioral1
Sample
Telegram.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
Telegram.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
Telegram.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
Telegram.apk
-
Size
4.5MB
-
MD5
44e5b0cbf02ca0b4b8ccef5486401662
-
SHA1
b3face6f2d031cea1ed3c3e664ade1eb81069320
-
SHA256
629b90ee5534bccfbf2d1d305ec3169afc15a025fc342670dd78a4b166ae8d11
-
SHA512
e33cc1a7bb215b76f6561189c6b44c628d5fa038efcda76e0b4a34cb728a7d98f2c09976941e328ca7b22aaa7e87d8d1c9655b6319b2a683ec47d5df5db50189
-
SSDEEP
98304:lWm2fQdVuGYbATF3vqM1abfxYQfqmznzB8TQ0tApNwiIsfpz:B24nuGQATFyh7tzK7gV39
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.fever.morrisdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fever.morris -
Acquires the wake lock 1 IoCs
Processes:
com.fever.morrisdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.fever.morris -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.fever.morrisdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.fever.morris -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.fever.morrisdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.fever.morris -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.fever.morrisdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.fever.morris
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
25B
MD504f412407df2e4495f811906b6f817e7
SHA1a8dbd085774d1222c7c518d68556267d7ab781f3
SHA256b179c1083e6f3b6a12b5694fb230ae09e7c8757dbd55faee99dc0ba7dce7caff
SHA512664c8426569854e42568443cb0daaaba4517c93cbf4d8db8690e5a4665af7eeabd50de7f55f8df76fa8e6179c7ccbd6cc3c3d7888bcc6a7a8a093dae9a914526
-
Filesize
25B
MD5bdb821a955117250611e94cd23842584
SHA181edcea1b44f94cfc140710c8410d0696b760c67
SHA256076eb89055ff3d929eb732e1002a0105652e628682a741151388ce1df3b6ec9d
SHA512e52ffed4ee84acc414c530c239c8876d9e99c1f2b2c7626c0ed7fbe0c59b9cb8f8a5e9e983541bea3dfdb849dd3b9593df054c2482ed8bcda7c70ebd960ca268
-
Filesize
65B
MD5480a79425a22110d11d8be973e40eba9
SHA15936271ee975c5bcf22b018b6e4debb93ced03ba
SHA25692bff949c9d5bc9470e81b739e574929e630f5fba07e49d4e8d0080bc231ebf0
SHA512b0404588b6def8072639c5222bc49718d06f80fb077798b1c710f3c071a010a1ae4f1463e750c87b997f9b790cc02664132724f0be419b9f0a0ef388d94c37a6