Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
01/10/2024, 16:56
Behavioral task
behavioral1
Sample
8fdbd260ff78dfae55ee426bf591248c398051f22017d33c8ac56ebaf1177a72.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8fdbd260ff78dfae55ee426bf591248c398051f22017d33c8ac56ebaf1177a72.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8fdbd260ff78dfae55ee426bf591248c398051f22017d33c8ac56ebaf1177a72.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
8fdbd260ff78dfae55ee426bf591248c398051f22017d33c8ac56ebaf1177a72.apk
-
Size
3.8MB
-
MD5
92ccfac60e62f64d51f54ca06faa420f
-
SHA1
9706a6aaa6613b2488a6c4376092cc0e482ee4b7
-
SHA256
8fdbd260ff78dfae55ee426bf591248c398051f22017d33c8ac56ebaf1177a72
-
SHA512
45af153d0c4e8c7eb4edd5a374e3f93f92901a9192dbff3ad8ce83b8a06d66dd57a0bf7713b1f1c2d3f8aef446cf9bd7cb2b358a468922ee7136bf178c36b0a8
-
SSDEEP
98304:qJeZw3CCh6/D260/iuP2FmzpzB4TM0txB+ka4:qQVChqDsiuP2ozIfjk4
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId few.critical.match -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener few.critical.match -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock few.critical.match -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground few.critical.match -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo few.critical.match -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone few.critical.match -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver few.critical.match -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule few.critical.match -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo few.critical.match -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo few.critical.match
Processes
-
few.critical.match1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4964
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5d6c0bf70ca8cf5af5036c42880e8c555
SHA18c85f9d016f01855432aef042e66ba2a67fd6825
SHA2563dca3120562c8be3f51910e258e40cd8f3d16f98a630f09811b07227c5ee9bd7
SHA5123626bbc9d6b4e65e65830ae7c1e3d4adf7bbd5ee811f0b97ec49f6f9e4331ef429f5074fdb556db10382e3636d70f3f9512773fde77d4e6972cc7149ee377f2b