Resubmissions

14-08-2024 02:25

240814-cwdkyavejd 10

08-08-2024 10:50

240808-mxkqrawejh 10

21-01-2024 13:10

240121-qevpsadbfl 1

Analysis

  • max time kernel
    179s
  • max time network
    172s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    14-08-2024 02:25

General

  • Target

    childapp.apk

  • Size

    9.3MB

  • MD5

    c823398194ffcb88a6c468778de5d177

  • SHA1

    3c2d5c8dc9df1c87c9070a0119b25070d2f49efd

  • SHA256

    a2c47d36bc98eb2a0681d601469beca29ee8b3c76769776cc21ac57253f9c631

  • SHA512

    81822cc22ee5e3bc368ff60d904994f07eb0fcd15359fe5ffb6ea005c84bb3881d74828a2d86fd8757017a3bd28496a4d151a750b844b6ae8771029477fa24bf

  • SSDEEP

    98304:V4zBJTHmz6Sv2PQIMFc3PSxX+U4et470tqvizr7+fpS:UGz6SvAQMEV4eak8fpS

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • tim.hd.they
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    PID:4999

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2024-08-14.txt

    Filesize

    13B

    MD5

    de2c41a51ee9246eb1708f65b511add0

    SHA1

    2f442d634c8a18760a232c8829d4b5d74a52f074

    SHA256

    ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab

    SHA512

    7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a

  • /storage/emulated/0/Config/sys/apps/log/log-2024-08-14.txt

    Filesize

    33B

    MD5

    33053d22916825e664d8d30a2f82d4f3

    SHA1

    6ae200c9a36a3a53e4ce4cbdb49db4a147855903

    SHA256

    6ec1087b27195f5a7e4116cee1254df5259fb824f8683953eb427035d081957b

    SHA512

    52d6d1b80f32fc9a2ed9289bb103ab20b17f1b9883ab684fd851ff78da9e2e28f92c9c8599792ca7f4faecc7060df4d487d13af11614bd0a60b65a1c15d37331

  • /storage/emulated/0/Config/sys/apps/log/log-2024-08-14.txt

    Filesize

    29B

    MD5

    11fa7fad5a8ff5baea05ef1d75d56402

    SHA1

    dd9778eb3a0fa8204ad9dccb9fbf6b711cb736ba

    SHA256

    76daa30be424486bb90569267769be8bbc28d5770b9d8b07d41372d064df9ba7

    SHA512

    6bc8d9f1a98cd5bd6bf3f496b201a50780afce5e2b288850a303a4f0d0dfcef9bc5c0a8a750bd1d8245061482c837b1fe1244e452e8aa6f05d6e56aec81e6616