Resubmissions
17-10-2024 22:13
241017-142vhasglp 10Analysis
-
max time kernel
145s -
max time network
153s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
17-10-2024 22:13
Behavioral task
behavioral1
Sample
MediobancaToken.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
MediobancaToken.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
MediobancaToken.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
MediobancaToken.apk
-
Size
4.7MB
-
MD5
1150d0bf3a077be4f33eb487129d389a
-
SHA1
0fc8c1e2c08fd3dc83ceb72a4848c9aab66b7d57
-
SHA256
d852f48e1c8a37d11f9dfb90f339316a5a3fa012bf152db43de1e81b45a69ba7
-
SHA512
cd6d0097d67420d7596c3015f1b7ed777b42b7ac5b842f3107043bc3609fe3a2b391d7964d6262304ccc5255d51cbed0053a9e7e99ad350e85a1e838579cfa98
-
SSDEEP
98304:V9hinlhin6Vhinahinx1hin6hinshinUhinwFWKeUzE4b60sgPo8vI:VbCzC6DC8CxjCcCyCKCwFPecO0dhvI
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.mediobancaapptoken.appdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mediobancaapptoken.app Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mediobancaapptoken.app -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mediobancaapptoken.appdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mediobancaapptoken.app -
Acquires the wake lock 1 IoCs
Processes:
com.mediobancaapptoken.appdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mediobancaapptoken.app -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.mediobancaapptoken.appdescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mediobancaapptoken.app -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.mediobancaapptoken.appioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mediobancaapptoken.app android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mediobancaapptoken.app android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mediobancaapptoken.app android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mediobancaapptoken.app android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mediobancaapptoken.app android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mediobancaapptoken.app android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mediobancaapptoken.app -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.mediobancaapptoken.appdescription ioc Process File opened for read /proc/cpuinfo com.mediobancaapptoken.app -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.mediobancaapptoken.appdescription ioc Process File opened for read /proc/meminfo com.mediobancaapptoken.app
Processes
-
com.mediobancaapptoken.app1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Checks CPU information
- Checks memory information
PID:4477
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5c9ba8af2c46cfab6a421f96b0c7a4aba
SHA17cf335d13973adb71de16c9683c65326e04d0107
SHA256c4ddb071f51d8ccf2ae17406c75498de55d820371a8b28c77197a127d131863c
SHA5120fb0dc739a67f5dca3872f616adbbf361a82075411e17a3d6be06d7d52126b284f2119524d9ea47c251d77752b4802727d1499f015977616dc8ddcdd40309afd
-
Filesize
121KB
MD57b38720a0352dffa26411726c72dd2b0
SHA1b15e687f42abcdc12427f146a3115ef2259211f8
SHA2562013f490d45638cada331b3474ed65b9a43cec60da773accc98332e58c06336d
SHA5120df28f87da4f9beb3ca8c108f54021a2a1a1434771abbb5ba67a2736097f2287b05e5220a33e92c42ee13ecae1144714a422b986763712794f69e65bc44c83e3
-
Filesize
11B
MD51b65c10c6215685f9d621d797f911373
SHA1cc50aaed5cd521a62ec8cf9fe0413153ec90f265
SHA2562230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89
SHA5125a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f