Analysis
-
max time kernel
149s -
max time network
158s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
24-09-2024 07:24
Behavioral task
behavioral1
Sample
CertificatoN26.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
CertificatoN26.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
CertificatoN26.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
CertificatoN26.apk
Resource
android-x86-arm-20240624-en
General
-
Target
CertificatoN26.apk
-
Size
7.4MB
-
MD5
966b46fc2fe926b49e2cdf5573603136
-
SHA1
5375e9b5a671b3ffea02db3cbffaf4bbf490124e
-
SHA256
5ac92e22f992004635e0a52c46693e9cb7ad1608eb499663a6a4a6699a359348
-
SHA512
30da998861bd029c9a490828ca7be53b10c42e3fcb74c5eda92b7095b148d0af4f67780d3d45ed6a61691fe61d9a05b64c4e31fa6e808f58216235f6dd9c350c
-
SSDEEP
196608:A+aTxoitfyBeQA89MIKR+mt7QDHDEDRDhDCaDyDpDqEV:uTWs89mR+FjQ9t3WFrV
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.usmimanncc.newicondescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.usmimanncc.newicon Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.usmimanncc.newicon -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.usmimanncc.newicondescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.usmimanncc.newicon -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.usmimanncc.newicondescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.usmimanncc.newicon -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.usmimanncc.newicondescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.usmimanncc.newicon -
Performs UI accessibility actions on behalf of the user 1 TTPs 23 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.usmimanncc.newiconioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.usmimanncc.newicon -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.usmimanncc.newicondescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.usmimanncc.newicon -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.usmimanncc.newicondescription ioc process File opened for read /proc/cpuinfo com.usmimanncc.newicon -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.usmimanncc.newicondescription ioc process File opened for read /proc/meminfo com.usmimanncc.newicon
Processes
-
com.usmimanncc.newicon1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Checks CPU information
- Checks memory information
PID:4339
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
427B
MD5daadafd4adf7c2da3351beb9c3bfb9dd
SHA16673c20620fdc3dd31a1ec9d78392c3d46cb2f50
SHA256f1251b8332a1b29c67682c9e1f9975ab0f611395e24534cc6168b68e778192f1
SHA512faafe0145ee0fe888e0829123266dc65348270fdf51a494378d3195b6c86fee5c52a4ca2cfd3e162e0eee25c570d947b8270ff08636bc25339757cfc2f9ccdb7
-
Filesize
4B
MD5098f6bcd4621d373cade4e832627b4f6
SHA1a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
SHA2569f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
SHA512ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
-
Filesize
44KB
MD5d5d190e1180c5e6858c40a93f7526f12
SHA10d054f2e34776c8d5bcfd54d743831b9919618fe
SHA256274fe3e82fc2630d99809afd6a1c64768a77ed69c04b33e0df6a292a5a042203
SHA5120d58df37359d6e35f02ef95e4edcfb05fac6c3bc57d1c3e56e49fa7b6c66aef3f99b383cb14dc5a01b52bc6a0d4685f275fb30279aa26e8339a5e0b8416ba85e
-
Filesize
121KB
MD57b38720a0352dffa26411726c72dd2b0
SHA1b15e687f42abcdc12427f146a3115ef2259211f8
SHA2562013f490d45638cada331b3474ed65b9a43cec60da773accc98332e58c06336d
SHA5120df28f87da4f9beb3ca8c108f54021a2a1a1434771abbb5ba67a2736097f2287b05e5220a33e92c42ee13ecae1144714a422b986763712794f69e65bc44c83e3
-
Filesize
12B
MD5537438d91dbef572a95aa871bb30aa0d
SHA1500aeb9d5565b952331daa14b003fde37222fa3d
SHA256a36ed0a8dff4f2fe73de580adbd8aa4363b8537916b6deed4d53446d9a10a630
SHA512596b39f360186789c7bd94841ce85e45f1c60f0098dfb33c6dc2c341e88881a3728d6673a81e3b10d26888b3037bd7aa2f17a50fd6e6ec89f773dbe0ea2ee11e