Resubmissions

07-11-2024 03:20

241107-dv3zwatlbv 10

27-09-2024 14:25

240927-rrnmnswgrm 10

Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    27-09-2024 14:25

General

  • Target

    Instagram_src.apk

  • Size

    5.5MB

  • MD5

    3c2332b53bdb1c8f766d3fb98902b10a

  • SHA1

    7b21a68ac09a27e2d5ba6c4f7f9e9d4c59a29ecd

  • SHA256

    1fdcdd2a042fc37b1755fcd3f4bac408d04f783cbde840a2d3c346561b32b49e

  • SHA512

    822f784253d4b6b983877514a4f843159d83fc9ee2d715f00d6cad051c3e19786e75d31b66c35b718ec0718a572220c436f487af1f53e68c2dd585e56ffed82d

  • SSDEEP

    98304:NwubXW62AALy6GqYZpcQb788aGg82Qr9pzbuV7zphCIJaL3188UofrFF3NPfw:NrXZJ6nicQHNaf8/IXrJaD1R3Vfw

Malware Config

Signatures

  • Checks if the Android device is rooted. 1 TTPs 9 IoCs
  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Changes the wallpaper (common with ransomware activity) 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • sigma.male
    1⤵
    • Checks if the Android device is rooted.
    • Obtains sensitive information copied to the device clipboard
    • Makes use of the framework's foreground persistence service
    • Queries information about active data network
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests enabling of the accessibility settings.
    • Changes the wallpaper (common with ransomware activity)
    • Checks CPU information
    • Checks memory information
    PID:4444

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/system/users/0/wallpaper_orig

    Filesize

    172KB

    MD5

    3d4ff9da31018857dcffcfce5169c85a

    SHA1

    53043cbdff4365ee55c2301950d89ec4d712ee17

    SHA256

    de5e27c41cfba5852e2226c054cde0a427a3d9f26f0f79eabbeb7f5e8ae3b7ef

    SHA512

    f02786f18346ccb2481ce70396280fa2a1876f3811c67f8ef77031f89a8b5ff00e3e6413a24e4983bb46343759e01df6078b8e5b4a40f3603018079ed8a1f62a

  • /storage/emulated/0/Android/data/sigma.male/files/apps.html (deleted)

    Filesize

    1.6MB

    MD5

    5b9e06463f4725dd31976206ca69d126

    SHA1

    7d53cdaf5efeb12950b2d5493210ba16973052f3

    SHA256

    bad3fc984fe634857c423f420812f1228560e7b77307819e1b75a66a1602a3f7

    SHA512

    c955bb2ef4ece2ef2a3e50d90fb9e4e843738e25b126a65b4ac545c198052438980cc2e33f6c982c0b61ca33e620f338f6181e89ece24f3551af60195f615e07

  • /storage/emulated/0/Android/data/sigma.male/files/panel.txt (deleted)

    Filesize

    19B

    MD5

    6e0075dcc0b7ac222bea767743b61a33

    SHA1

    44b3eaebc17568ca6e120747fef61521137068d9

    SHA256

    d0d1b610858419980e61586967769ed1bf001756aacbd5e00518b3b0eb83a402

    SHA512

    9950d09e464f74889ae85d70e72e57197b8a2713518bb7901b2c7b6e1ae51dc7e53547b2865f0226bfcc3bd5ea530453298512f8ecbc7b790da3339b5e05cf42

  • /storage/emulated/0/Android/data/sigma.male/files/uid.txt (deleted)

    Filesize

    8B

    MD5

    0d191052b824524318a6909fea30e0e4

    SHA1

    70f0a71c8839d7f760aaf6c20cdc4d9ef159dc02

    SHA256

    be48bb5af63d17a3ba289789e0d3bb8abceb56504776f47eba71aafab8ab57e6

    SHA512

    de2cc00578c263cefb6711ab40a4e0cfa7c368d17d99b6819826b95a804b39ef84e6f4edfafba83ff2db2cd770f51c16373e5a7a3843ebc39974dd88b93412b9