General
-
Target
0e630d146980f5c5df63c69ca9b018602c95183f8347a753ca3f5ad8aed4778e
-
Size
4.5MB
-
Sample
240811-j7pwnswbrh
-
MD5
ff73bc05d90e48b3ebdb1778fd9fa367
-
SHA1
0384f40fb236d51022af20eca0c6a6828f0f4fac
-
SHA256
0e630d146980f5c5df63c69ca9b018602c95183f8347a753ca3f5ad8aed4778e
-
SHA512
c5806ef3d073f8b05856ea40e18a5973f4be449fe98800e1f6ca8b8ba3d16f2bee6114d1e5755b6c633a031546be9a0c0ee976c9be7325d055bee35fcd2ce830
-
SSDEEP
98304:Jmvy3cPgO4z5h7cb7J/mC5z3PpUmz1zBYT50t4tNw4e7nl:wxwz3IJZrRzUWcvE
Behavioral task
behavioral1
Sample
0e630d146980f5c5df63c69ca9b018602c95183f8347a753ca3f5ad8aed4778e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0e630d146980f5c5df63c69ca9b018602c95183f8347a753ca3f5ad8aed4778e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0e630d146980f5c5df63c69ca9b018602c95183f8347a753ca3f5ad8aed4778e.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
0e630d146980f5c5df63c69ca9b018602c95183f8347a753ca3f5ad8aed4778e
-
Size
4.5MB
-
MD5
ff73bc05d90e48b3ebdb1778fd9fa367
-
SHA1
0384f40fb236d51022af20eca0c6a6828f0f4fac
-
SHA256
0e630d146980f5c5df63c69ca9b018602c95183f8347a753ca3f5ad8aed4778e
-
SHA512
c5806ef3d073f8b05856ea40e18a5973f4be449fe98800e1f6ca8b8ba3d16f2bee6114d1e5755b6c633a031546be9a0c0ee976c9be7325d055bee35fcd2ce830
-
SSDEEP
98304:Jmvy3cPgO4z5h7cb7J/mC5z3PpUmz1zBYT50t4tNw4e7nl:wxwz3IJZrRzUWcvE
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1