Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    11-09-2024 22:11

General

  • Target

    c423d040a498a6182f0ef110cbbfbacb8f49e01622781ba5eb88a6297856b01d.apk

  • Size

    541KB

  • MD5

    ea6e311f6ffbcc9e0f10deebbed6021a

  • SHA1

    16487046424e6d4a0f978a6c91e14b96a59a4a1d

  • SHA256

    c423d040a498a6182f0ef110cbbfbacb8f49e01622781ba5eb88a6297856b01d

  • SHA512

    df828e01c8ee100de7cb111386dc241c88337b7e5e736e258c5ec3e90fb7a1f0ef45e9a16a6978d00c84d83d8af39ce1c2b3d4077f5fc240b0e768689831d72a

  • SSDEEP

    6144:s9NMfGzRrVbmjxINJA2Sfk/1itmsaSS/WqLkN0uMHc9wUBvSh0wtB5jeRVYDEbjT:s9hHmjxV1tmsKW2k6OOleRW9JguG

Malware Config

Extracted

Family

octo

C2

https://aiposcmplso2.com/YTFlMzViNjNiNWM3/

https://aiposcmplso42343.com/YTFlMzViNjNiNWM3/

https://aiposcmplsoi343.com/YTFlMzViNjNiNWM3/

https://aiposcmplsoi3467.com/YTFlMzViNjNiNWM3/

rc4.plain

Extracted

Family

octo

C2

https://aiposcmplso2.com/YTFlMzViNjNiNWM3/

https://aiposcmplso42343.com/YTFlMzViNjNiNWM3/

https://aiposcmplsoi343.com/YTFlMzViNjNiNWM3/

https://aiposcmplsoi3467.com/YTFlMzViNjNiNWM3/

AES_key

Signatures

Processes

  • com.theirafterq
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4336

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.theirafterq/cache/imjafflqxpzrqo

    Filesize

    449KB

    MD5

    bdd419af74c8c5a8102be9da36738554

    SHA1

    7d64429f308c5c49910fdddb236f8af14af2bf99

    SHA256

    ba1f4730fb8f59bcbe25f11fbbcd5c91c640328b208787ddc3e021f5436aca71

    SHA512

    1370439cc09a8fd1686c71aacb567a553ac6875a867b96b5bf2ab9d3d3bd25679adfebca52f9acdde4e7fec3b2741eda4bc39d272d8e2adf571fc1645742e784

  • /data/data/com.theirafterq/cache/oat/imjafflqxpzrqo.cur.prof

    Filesize

    535B

    MD5

    ce538eaa3b7cbf1670d3fc05a69b22d7

    SHA1

    6778315d839e9117dae790ef7be40ab598ba528d

    SHA256

    51290a8c473e2a49d6c1be57e77311a524595775d0685ec0a4564bf876464314

    SHA512

    98258a22504a856651427b7417e290254c2ec12d1524d6ee62bdf7bbdd61efd8b708606e366283ff3e12d0fbb6464b1379410c35633fa0f07f83e2960534e421