Analysis
-
max time kernel
179s -
max time network
176s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
07-08-2024 14:20
Behavioral task
behavioral1
Sample
0a25b3f831188ff7e3081ee9b50aae91ecba4914e5e0acc2ec918d8ed2fbe3f4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0a25b3f831188ff7e3081ee9b50aae91ecba4914e5e0acc2ec918d8ed2fbe3f4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0a25b3f831188ff7e3081ee9b50aae91ecba4914e5e0acc2ec918d8ed2fbe3f4.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
0a25b3f831188ff7e3081ee9b50aae91ecba4914e5e0acc2ec918d8ed2fbe3f4.apk
-
Size
4.6MB
-
MD5
d4848bb410e10d4f77376e240a000f00
-
SHA1
c1ff5e2267a08514db9d62c96066a4108fa579e1
-
SHA256
0a25b3f831188ff7e3081ee9b50aae91ecba4914e5e0acc2ec918d8ed2fbe3f4
-
SHA512
142bad677109d7c96897e8298604ec39122cbd3e1b8fbd7f4115e4e20fa5a82404c4788868171c460494ee96dc5ec23d2a672353f5cf7e7d67dddb6dff8db247
-
SSDEEP
98304:lqzFBeziJMk/gPctR29F/dqyptEguQO9ijCTmztzBeTr0tUBGtLiz:lq5BKs/gEL+uf7Sz+UJs
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
build.ledear.apkdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId build.ledear.apk -
Acquires the wake lock 1 IoCs
Processes:
build.ledear.apkdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock build.ledear.apk -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
build.ledear.apkdescription ioc process Framework service call android.app.IActivityManager.registerReceiver build.ledear.apk -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
build.ledear.apkdescription ioc process Framework service call android.app.job.IJobScheduler.schedule build.ledear.apk
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
21B
MD5946e373e38146a54081a1b9864e583d7
SHA127126fc7a48e8e0ad93c7726d5cc060de9fe620a
SHA256278a7f47f84c135f0deefd6ae43b42ab198a62019fb92c4fc375a1e1df512f0c
SHA512033b387980febb06ca6946fa262eba916131615709ce9a81932a520c8e12767bdc23f5e6a5280616b1e8fb16a4932edc47a68baa2b7e247eca4f235448fb5a77
-
Filesize
25B
MD5bdb821a955117250611e94cd23842584
SHA181edcea1b44f94cfc140710c8410d0696b760c67
SHA256076eb89055ff3d929eb732e1002a0105652e628682a741151388ce1df3b6ec9d
SHA512e52ffed4ee84acc414c530c239c8876d9e99c1f2b2c7626c0ed7fbe0c59b9cb8f8a5e9e983541bea3dfdb849dd3b9593df054c2482ed8bcda7c70ebd960ca268