Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
179s -
max time network
188s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
23/08/2024, 13:08
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
ready.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
ready.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
ready.apk
Resource
android-x86-arm-20240624-en
General
-
Target
ready.apk
-
Size
5.6MB
-
MD5
968a107ff580a03959ac90ae8a5952e9
-
SHA1
bc513532c356995f7b0cfeaafb42793e65c57ff6
-
SHA256
afa70b455d4ee532d679323f6e189b225647784ca8103df62acc5c78c537f9cb
-
SHA512
c0d566e0d96c0f35abf022ee32df8af0703cc65e7e55260f788d32747b65d9b5268a086f9c0f27cf67d87110b854bc871d4709462efdc2f104425a79000a0917
-
SSDEEP
12288:twlbo9GgLRBWItYYyow7HCgI4arSQP7fKBx6Rq21Fg975oC:twlfglBWItYYjwjCgI4EmbGN2R
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId upskirto1.kiss.street Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId upskirto1.kiss.street Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText upskirto1.kiss.street -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener upskirto1.kiss.street -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock upskirto1.kiss.street -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground upskirto1.kiss.street -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS upskirto1.kiss.street -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule upskirto1.kiss.street -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo upskirto1.kiss.street -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo upskirto1.kiss.street
Processes
-
upskirto1.kiss.street1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4315
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20B
MD5e2ee1d5a5fd0f95c540e2e454514c7fc
SHA16d00b6c1e3f8201042bbaf93d3a330cfd7357b3a
SHA2562f12b8423a6aad2f17a2256bde9b8c5f34f4f02c17179814b388996580fc7b1e
SHA5121d40224ff0c3b93d4dbb1db0ab3615753cf2172afbf2278a92d4860d55ead9f64f6817b6444d0b4ac144e52b33b6b9cb43706f5ebf6696f6aafadfc3189ffec5
-
Filesize
12B
MD5a9256f55737b655c8cff95418411997c
SHA1d81a4e85ecef3a4f08d50da9c75c49a3c64ffe24
SHA256bad705c44807d12463fb587087c4e9eb24769d82981229ac8b74abc9b1a44412
SHA51210d10a6498973ed65d47c74ba6d8831dad94213a5071353dc445de46e021689284fbbf4accf5ba1f97a0675a7652ec069ac70f38d63ba36b8595a8caf8d37574
-
Filesize
16B
MD56596cd7293b7aafa14515f8ff4948543
SHA1c4e30be643f53194d65ac3380930b781d1192ecb
SHA2560b49978eb8a0c84aaa80de17f2e5c5a48c12d5314a4657dfb9ae8914f51e778a
SHA5129afdbcfcb870cf65bd2010e94bc9c1f93de5a6bd356786baa2cbdda6050d89767dc55f1345d5825b753e7ce6ed8c0357306640657571ce18f4e6bac8a05a8032
-
Filesize
247B
MD509e3ccfd9c71c4e04f15b8bde4cee636
SHA1b86e926f15c06c0a9801da602a0a18946ea49b36
SHA256fc1eb614bdb7af7bd73bc52c3ae7ae42656f2013854491a7a61972b2897326a9
SHA512e2045bd9e4ae6af1f4d9ba967390df86ec6713e0a053ec24d16dd30c96be761362e09b7b31e5d8e7f3954e28f4ee8532dbbad8b3ddd8ea272771318d208b2aca