Analysis
-
max time kernel
33s -
max time network
181s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
29-07-2024 22:00
Behavioral task
behavioral1
Sample
8fed5f3f9a3d7c726c6a89bef2af80993e631de5b968dbaeac724ffb1607dc40.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8fed5f3f9a3d7c726c6a89bef2af80993e631de5b968dbaeac724ffb1607dc40.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8fed5f3f9a3d7c726c6a89bef2af80993e631de5b968dbaeac724ffb1607dc40.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
8fed5f3f9a3d7c726c6a89bef2af80993e631de5b968dbaeac724ffb1607dc40.apk
-
Size
265KB
-
MD5
76e20b2d3a0dd9c9fad9bbc30bc3a33f
-
SHA1
0ea10286c31df0831506ba7483b568a0b41f803c
-
SHA256
8fed5f3f9a3d7c726c6a89bef2af80993e631de5b968dbaeac724ffb1607dc40
-
SHA512
d1a77f197c7a8a7d465f8c1cd1ab2cd4376b18895d3761cd8cb54c2d39e5d4391ca5bab2aadd06ce285c541ada4f4f4491c210b775da133103bd2ce4dc61a599
-
SSDEEP
6144:ELvezgwgG3CuoBmCyeEQ72s4aVrTXvvbvv3vvOvvlvvJ:E6Vh3YBawfjT/b3mhx
Malware Config
Signatures
-
Processes:
wocwvy.czyxoxmbauu.slsapid process 4967 wocwvy.czyxoxmbauu.slsa -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
wocwvy.czyxoxmbauu.slsadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId wocwvy.czyxoxmbauu.slsa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText wocwvy.czyxoxmbauu.slsa -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
wocwvy.czyxoxmbauu.slsadescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock wocwvy.czyxoxmbauu.slsa -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
wocwvy.czyxoxmbauu.slsadescription ioc process Framework service call android.app.IActivityManager.setServiceForeground wocwvy.czyxoxmbauu.slsa -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
wocwvy.czyxoxmbauu.slsadescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo wocwvy.czyxoxmbauu.slsa -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
wocwvy.czyxoxmbauu.slsadescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone wocwvy.czyxoxmbauu.slsa -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
Processes:
wocwvy.czyxoxmbauu.slsadescription ioc process Framework API call android.hardware.SensorManager.registerListener wocwvy.czyxoxmbauu.slsa
Processes
-
wocwvy.czyxoxmbauu.slsa1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4967