General
-
Target
qcojes.apk
-
Size
8.5MB
-
Sample
240926-ssk4lsxcrc
-
MD5
df2e25512953821661b4ab8a5688a9c8
-
SHA1
7f60852fef126e5fd8e71266a65ed153b6094d40
-
SHA256
58911b7dbc485fb5e8bc3967de002ab5cb898023223d7a41e5dd7e1a074e40b1
-
SHA512
a9d57579442311c693af3c4c5fecb4ef8cd4d68c2ddbb4a6734eb892ba6e5cca58fa4468f07a47da7433d2329a75d948696a652341fb05be30e4a448eb61c127
-
SSDEEP
196608:G1mTS0d6slb4lDlPUfTDfu/cggd0CRCYSIB2euR2kSdr4l:G8d6slb4lJPuTDfu/cICR9B21R2P4l
Static task
static1
Behavioral task
behavioral1
Sample
qcojes.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
qcojes.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
qcojes.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
dogexuzo.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
dogexuzo.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
dogexuzo.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
qcojes.apk
-
Size
8.5MB
-
MD5
df2e25512953821661b4ab8a5688a9c8
-
SHA1
7f60852fef126e5fd8e71266a65ed153b6094d40
-
SHA256
58911b7dbc485fb5e8bc3967de002ab5cb898023223d7a41e5dd7e1a074e40b1
-
SHA512
a9d57579442311c693af3c4c5fecb4ef8cd4d68c2ddbb4a6734eb892ba6e5cca58fa4468f07a47da7433d2329a75d948696a652341fb05be30e4a448eb61c127
-
SSDEEP
196608:G1mTS0d6slb4lDlPUfTDfu/cggd0CRCYSIB2euR2kSdr4l:G8d6slb4lJPuTDfu/cICR9B21R2P4l
-
Antidot payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks the application is allowed to request package installs through the package installer
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
-
Queries the mobile country code (MCC)
-
Requests allowing to install additional applications from unknown sources.
-
-
-
Target
dogexuzo
-
Size
9.7MB
-
MD5
ed1dd47ee8ea4b6bb0d06837c5e96d70
-
SHA1
1bce41dfb97da1cd4cd51026df78d33c78bb66be
-
SHA256
5c6d278d5791748650065233697419a744a1d12f50960dd56b9f86b59dd052c7
-
SHA512
df139dffe6aea4d05a03ba1bd7e9352f02f1e6914c427219a209d6fbc7150bc757ab8aa41c4ee2f3542f2c3c99183b5e6947145652dee9b7e078649035aac4eb
-
SSDEEP
98304:Fmv/Hh3MT/Jfr+c/byhZMzYWV2ieSyeTgnrSsVo/KrL1QeWLn4H:Fmvfh3c/JfrZbyhZrWEYErSslQeon4H
-
Antidot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Reads the content of the SMS messages.
-
Queries the mobile country code (MCC)
-
Requests enabling of the accessibility settings.
-
Requests uninstalling the application.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Indicator Removal on Host
1Uninstall Malicious Application
1Input Injection
1Subvert Trust Controls
2Code Signing Policy Modification
2Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1