Resubmissions

14-08-2024 02:25

240814-cwdkyavejd 10

08-08-2024 10:50

240808-mxkqrawejh 10

21-01-2024 13:10

240121-qevpsadbfl 1

Analysis

  • max time kernel
    179s
  • max time network
    169s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    14-08-2024 02:25

General

  • Target

    childapp.apk

  • Size

    9.3MB

  • MD5

    c823398194ffcb88a6c468778de5d177

  • SHA1

    3c2d5c8dc9df1c87c9070a0119b25070d2f49efd

  • SHA256

    a2c47d36bc98eb2a0681d601469beca29ee8b3c76769776cc21ac57253f9c631

  • SHA512

    81822cc22ee5e3bc368ff60d904994f07eb0fcd15359fe5ffb6ea005c84bb3881d74828a2d86fd8757017a3bd28496a4d151a750b844b6ae8771029477fa24bf

  • SSDEEP

    98304:V4zBJTHmz6Sv2PQIMFc3PSxX+U4et470tqvizr7+fpS:UGz6SvAQMEV4eak8fpS

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • tim.hd.they
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    PID:4264

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2024-08-14.txt

    Filesize

    13B

    MD5

    de2c41a51ee9246eb1708f65b511add0

    SHA1

    2f442d634c8a18760a232c8829d4b5d74a52f074

    SHA256

    ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab

    SHA512

    7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a

  • /storage/emulated/0/Config/sys/apps/log/log-2024-08-14.txt

    Filesize

    29B

    MD5

    73796bbdf5efd7eb9751ebcb49a534f2

    SHA1

    cdae49b5d77ce9504cfa959e3c80859b5614f7cf

    SHA256

    3980309558e204ff9cf530ce79da2d6e72dafe5ed02a4a028cfe0d305c798df1

    SHA512

    d79be30e8ddb39156cfd6c28c93df8e95107a39cf92d24e43ebb83f19d419c390d0541d59af8fe35e57198ac3934e96ad60f3f637c1b0112b7722b551d8491a3

  • /storage/emulated/0/Config/sys/apps/log/log-2024-08-14.txt

    Filesize

    25B

    MD5

    bdb821a955117250611e94cd23842584

    SHA1

    81edcea1b44f94cfc140710c8410d0696b760c67

    SHA256

    076eb89055ff3d929eb732e1002a0105652e628682a741151388ce1df3b6ec9d

    SHA512

    e52ffed4ee84acc414c530c239c8876d9e99c1f2b2c7626c0ed7fbe0c59b9cb8f8a5e9e983541bea3dfdb849dd3b9593df054c2482ed8bcda7c70ebd960ca268