Analysis
-
max time kernel
179s -
max time network
187s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
28-08-2024 22:00
Behavioral task
behavioral1
Sample
11100195c06f9661288f1cd7551bcdfc88c542bfa194e789e43d7ce0cce626b0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
11100195c06f9661288f1cd7551bcdfc88c542bfa194e789e43d7ce0cce626b0.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
11100195c06f9661288f1cd7551bcdfc88c542bfa194e789e43d7ce0cce626b0.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
11100195c06f9661288f1cd7551bcdfc88c542bfa194e789e43d7ce0cce626b0.apk
-
Size
4.5MB
-
MD5
ebb9792d9af848de975a425ca13236bf
-
SHA1
ad140aaa14fd1fe7779b26718f2c7522bfdadf7b
-
SHA256
11100195c06f9661288f1cd7551bcdfc88c542bfa194e789e43d7ce0cce626b0
-
SHA512
00884c303f499c729127154d3bd664f274dab9d231117d89b61f3a0a05474f3bedc66ae94760c6dfafdecb4684ecdbeee34b7b0f4b73002beeee22768eba6a07
-
SSDEEP
98304:uQaM8EoiJ1zM7jQmG3fAD0eQD0QD0BD0EqD0nACD0yD0JD0ShM:u4OQmG3fADyDNDADkDC7DnD8DLhM
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ispmyappnuova.apkdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ispmyappnuova.apk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ispmyappnuova.apk -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.ispmyappnuova.apkdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ispmyappnuova.apk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ispmyappnuova.apkdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ispmyappnuova.apk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ispmyappnuova.apkdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ispmyappnuova.apk -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ispmyappnuova.apkioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ispmyappnuova.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ispmyappnuova.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ispmyappnuova.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ispmyappnuova.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ispmyappnuova.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ispmyappnuova.apk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ispmyappnuova.apk -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ispmyappnuova.apkdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ispmyappnuova.apk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.ispmyappnuova.apkdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ispmyappnuova.apk -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.ispmyappnuova.apkdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.ispmyappnuova.apk -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.ispmyappnuova.apkdescription ioc process File opened for read /proc/cpuinfo com.ispmyappnuova.apk -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.ispmyappnuova.apkdescription ioc process File opened for read /proc/meminfo com.ispmyappnuova.apk
Processes
-
com.ispmyappnuova.apk1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4942
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427B
MD5daadafd4adf7c2da3351beb9c3bfb9dd
SHA16673c20620fdc3dd31a1ec9d78392c3d46cb2f50
SHA256f1251b8332a1b29c67682c9e1f9975ab0f611395e24534cc6168b68e778192f1
SHA512faafe0145ee0fe888e0829123266dc65348270fdf51a494378d3195b6c86fee5c52a4ca2cfd3e162e0eee25c570d947b8270ff08636bc25339757cfc2f9ccdb7
-
Filesize
4B
MD5098f6bcd4621d373cade4e832627b4f6
SHA1a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
SHA2569f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
SHA512ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
-
Filesize
44KB
MD5d5d190e1180c5e6858c40a93f7526f12
SHA10d054f2e34776c8d5bcfd54d743831b9919618fe
SHA256274fe3e82fc2630d99809afd6a1c64768a77ed69c04b33e0df6a292a5a042203
SHA5120d58df37359d6e35f02ef95e4edcfb05fac6c3bc57d1c3e56e49fa7b6c66aef3f99b383cb14dc5a01b52bc6a0d4685f275fb30279aa26e8339a5e0b8416ba85e
-
Filesize
53KB
MD560db6fd304a70489e56535755ded99e6
SHA13730d49b1e7c2ddb60acf8b4af30c607c8cee9bc
SHA256649fc65689322fc9d08d237dd1d52bd7bae8db74a1b635ea77ae07a2af9376e0
SHA5127b57f08901a2bf424c85325e2429f5e7b7ba482a8a159a4d6955d1d177ad294c3051d3f174637599f59f848b8c8c95664a04725c828088bba1a1578547dd0881
-
Filesize
11B
MD51b65c10c6215685f9d621d797f911373
SHA1cc50aaed5cd521a62ec8cf9fe0413153ec90f265
SHA2562230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89
SHA5125a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f