Analysis
-
max time kernel
29s -
max time network
1236s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
06/08/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
ab40ae4fb7e04652e2908d0d49dd8430a9c9a51bfec512f58977e8929acdaab1.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
ab40ae4fb7e04652e2908d0d49dd8430a9c9a51bfec512f58977e8929acdaab1.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
ab40ae4fb7e04652e2908d0d49dd8430a9c9a51bfec512f58977e8929acdaab1.apk
-
Size
3.9MB
-
MD5
2788e87b8760ebdec67bce21899893d2
-
SHA1
1692e7f4cb9b9709b2a7a85a0d5b1cba993eb26f
-
SHA256
ab40ae4fb7e04652e2908d0d49dd8430a9c9a51bfec512f58977e8929acdaab1
-
SHA512
1d219fb100d4e09f843995c5433b76b9f26c8a0d505ec088103d602bfa0baa732a1d6065ac175d59f2a789c646bca6f61741c5a96c593aca3ede0554062e63ce
-
SSDEEP
98304:NYd2Zr8Fmmw/gSfOFoyOFINoJFdKG+EnNmluaEXDU0NdOLyOG:KmrRWFoyzAF7DguaIU8dOuL
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pescado.hitenhit/code_cache/secondary-dexes/base.apk.classes1.zip 4321 com.pescado.hitenhit -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.pescado.hitenhit -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.pescado.hitenhit -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.pescado.hitenhit -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.pescado.hitenhit -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.pescado.hitenhit -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.pescado.hitenhit
Processes
-
com.pescado.hitenhit1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Checks CPU information
- Checks memory information
PID:4321
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5efe4ef41f5f1291ad0dcccd9331c44b7
SHA1981e114fa5093705e1ef83574c29f881de74c4e0
SHA256ddf74e419e2128f2e9dfc2b21321896d877447f2e42130fc2bd6a3b0145a5e6f
SHA5123158112934a1e858a0a66cf80eacadc04525386e6fdb136aa52ac3203eb372237a7958355422aa3151aa1ed28617174591c1ec5688fcf1fd4eee6ae8004f8f1c
-
/data/user/0/com.pescado.hitenhit/code_cache/secondary-dexes/tmp-base.apk.classes2734014029189735021.zip
Filesize2.0MB
MD5590e11fb419a90333d2bb8fe74dd7d76
SHA1a662ec73876cef748d215bbaa8a2867ea3788637
SHA256c1c8d98bb5a711b5550f039160c8c72c22a63c1a4a633f2797654b2c4083817e
SHA512186cffc532675c943f4a6dffbb412b7ef8b86b9066ac19cf4adbf4bc3481f3f70d56e3632aebf39be9e2cb77dde6765c80fbd47c5e883a4f08150e815d466958