Analysis
-
max time kernel
179s -
max time network
188s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
24-07-2024 10:32
Behavioral task
behavioral1
Sample
Telegram.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
Telegram.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
Telegram.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
Telegram.apk
-
Size
4.5MB
-
MD5
2622ef302784ff3db7828fd86bffec49
-
SHA1
682f10ccb80d13388a53420d601af58701af8fb4
-
SHA256
65369746c8b8306df789650b0bbf1e3f39745e2fff9f947f2bb9fa63b0e9b7ea
-
SHA512
ede29c6dace52f86341469bc8a36af79b01320942b3ade8365c6a7e2e6d7c07935b4abcc644d6d074eab028d4d8ea8f0f5f317874c28bb21e92789c226d4cf6b
-
SSDEEP
98304:HExywluC06qHhHGMdrL8Hf80ZbMdmzFzBcTZ0tYFNwsyW/XZ:murDDCf80ZQwzA2E7bZ
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.combined.exhibitdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.combined.exhibit -
Acquires the wake lock 1 IoCs
Processes:
com.combined.exhibitdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.combined.exhibit -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.combined.exhibitdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.combined.exhibit -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.combined.exhibitdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.combined.exhibit -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.combined.exhibitdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.combined.exhibit
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
25B
MD504f412407df2e4495f811906b6f817e7
SHA1a8dbd085774d1222c7c518d68556267d7ab781f3
SHA256b179c1083e6f3b6a12b5694fb230ae09e7c8757dbd55faee99dc0ba7dce7caff
SHA512664c8426569854e42568443cb0daaaba4517c93cbf4d8db8690e5a4665af7eeabd50de7f55f8df76fa8e6179c7ccbd6cc3c3d7888bcc6a7a8a093dae9a914526
-
Filesize
167B
MD5b32b660f73582d7c52b4e11e1cd0c669
SHA1dcfaec1d0a828a7510542ff89fcfbe6d0b672e72
SHA25614690adbcf696d1cd60b7ecb59890d25097d611f85b2864796ac892901d8b3e3
SHA5120a10f9ec047a7f7ee4f98a3f64d8f1b3364a833d92c7671aa3e205e98b6d16a7fe8c9a9a1c7ff35c6a05fb55d33ddc5b199c2d29f63c65b8568b72081095f59a