General
-
Target
Mamba.apk
-
Size
3.7MB
-
Sample
241006-s9zy4asbrm
-
MD5
d02b0501f9c6c00b8406569ed26a9d14
-
SHA1
81803b06d7ea99d13f23b5a71748f76fc1f2fe66
-
SHA256
935239d2374a38a65119405fd8e028cb1b529ae2b05cd77b2840a8cd23a4e5c4
-
SHA512
f07d2932b431042ab55e4e22a5ea5ea77c89c20e9171136192aa08f476d450281ca2f2ab7f4d3b67e7c3b698a04228d9437b4684475b0f9d18ab48e174254cec
-
SSDEEP
49152:B1XEXZU/eRw/OJ12Lf1LJqANer46mznzdGGoQTOfiUOYq00cgAQv25ikTYI+4:BNgZUq2Y12b1BN6mznzBvTE0tAQkN
Behavioral task
behavioral1
Sample
Mamba.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Mamba.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Mamba.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
spynote
193.233.254.104:7771
Targets
-
-
Target
Mamba.apk
-
Size
3.7MB
-
MD5
d02b0501f9c6c00b8406569ed26a9d14
-
SHA1
81803b06d7ea99d13f23b5a71748f76fc1f2fe66
-
SHA256
935239d2374a38a65119405fd8e028cb1b529ae2b05cd77b2840a8cd23a4e5c4
-
SHA512
f07d2932b431042ab55e4e22a5ea5ea77c89c20e9171136192aa08f476d450281ca2f2ab7f4d3b67e7c3b698a04228d9437b4684475b0f9d18ab48e174254cec
-
SSDEEP
49152:B1XEXZU/eRw/OJ12Lf1LJqANer46mznzdGGoQTOfiUOYq00cgAQv25ikTYI+4:BNgZUq2Y12b1BN6mznzBvTE0tAQkN
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1