Analysis
-
max time kernel
140s -
max time network
151s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
09-10-2024 19:15
Behavioral task
behavioral1
Sample
QYADZO.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
QYADZO.apk
-
Size
40.1MB
-
MD5
c57e877b317a6ae1c731fc398eae134a
-
SHA1
19615fcb1d0cfcc30c114c4f69a62082b5615857
-
SHA256
845df5afe3977d1d0109d725cf63b0c21e23f870ccf2de613f66f96e8ea145bd
-
SHA512
6bd7d975a9a2ec29c6b0ebeb2117f922e5173775e6a3541baa1d9abf8901b8a46e53a8fa04b1b9aa6e51408a7716bc0228ec58268653a5290ec569121d637e5c
-
SSDEEP
786432:H38Ym2d67A9Ls3unQn1SxlMTpxABB9F5d3fHQ62G3Zu3V0u/U1S2h:ITn1SvMNxABB9vdx3ZgygUhh
Malware Config
Signatures
-
888RAT
888RAT is an Android remote administration tool.
-
Android Xamalicious payload 1 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_xamalicious -
Xamalicious
Xamalicious is an Android backdoor malware implemented with Xamarin framework first seen in December 2023.
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.example.dat.a8andoserverx -
Checks the application is allowed to request package installs through the package installer 1 TTPs 1 IoCs
Checks the application is allowed to install additional applications (Might try to install applications from unknown sources).
description ioc Process Framework service call android.content.pm.IPackageManager.canRequestPackageInstalls com.example.dat.a8andoserverx -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.example.dat.a8andoserverx -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.example.dat.a8andoserverx -
Requests allowing to install additional applications from unknown sources. 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.MANAGE_UNKNOWN_APP_SOURCES com.example.dat.a8andoserverx -
Requests dangerous framework permissions 4 IoCs
description ioc Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.example.dat.a8andoserverx -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.example.dat.a8andoserverx -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN com.example.dat.a8andoserverx
Processes
-
com.example.dat.a8andoserverx1⤵
- Acquires the wake lock
- Checks the application is allowed to request package installs through the package installer
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Requests allowing to install additional applications from unknown sources.
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Tries to add a device administrator.
PID:4351
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38.1MB
MD5147e6b26aa1f252bf912c7a1c3a01cb6
SHA12cf8e0ccb43311f5885d95bc0188462077a9f77d
SHA256af6985992d674ac664c07a659515de10eae7ecade0183fda28ac46bb83bcc425
SHA51289a72e52c0b739bdde18c80aef5ab162cad73f88a077429d3aff34c7d84ae7206949d5145acede4ff3359d324323fece006230a70064380e1878b3020172e89b