Resubmissions

14-10-2024 17:23

241014-vx752swhjf 8

09-10-2024 09:04

241009-k148fssclj 8

General

  • Target

    excess.undrilled.improper.crushing.apk

  • Size

    2.4MB

  • Sample

    241009-k148fssclj

  • MD5

    eb0ad0b462c65a40c16d43c15cd06aea

  • SHA1

    28b0a4559078eac3bd1c06b493c35408e3def804

  • SHA256

    136d00629e8cd59a6be639b0eaef925fd8cd68cbcbdb71a3a407836c560b8579

  • SHA512

    d5178c83b493999e380b68abc6511ace9c3296393f08bee01dd80582a752fa07a2658bd1d2d0ef3fed01cca9ef17b31c5e5e0c4986ea46ce91a19c9c10e42b58

  • SSDEEP

    49152:oRkr6w6JVKUf5wj0FRaVeRyWogZqChiBx1gwxm:V2dJIg7PaV8yvgZnhWm

Malware Config

Targets

    • Target

      excess.undrilled.improper.crushing.apk

    • Size

      2.4MB

    • MD5

      eb0ad0b462c65a40c16d43c15cd06aea

    • SHA1

      28b0a4559078eac3bd1c06b493c35408e3def804

    • SHA256

      136d00629e8cd59a6be639b0eaef925fd8cd68cbcbdb71a3a407836c560b8579

    • SHA512

      d5178c83b493999e380b68abc6511ace9c3296393f08bee01dd80582a752fa07a2658bd1d2d0ef3fed01cca9ef17b31c5e5e0c4986ea46ce91a19c9c10e42b58

    • SSDEEP

      49152:oRkr6w6JVKUf5wj0FRaVeRyWogZqChiBx1gwxm:V2dJIg7PaV8yvgZnhWm

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks