Analysis
-
max time kernel
148s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
21/10/2024, 13:00
Behavioral task
behavioral1
Sample
M-Pajak.apk
Resource
android-x86-arm-20240624-en
General
-
Target
M-Pajak.apk
-
Size
13.4MB
-
MD5
90da641f0e55387a8dcd5fce58dd5a09
-
SHA1
59c680a4671f09469d08670f8b198ebc1a2b5a5f
-
SHA256
9d8034cbc0246eb1329102086d73197b79ac4a4ec861597493cced3664e6e2b4
-
SHA512
37c213085fb83e1a962348633a5b419cd44942fe1e7f7b310fadabe6e455cd6a489fbcb2f6b783324780ce3962071d6266e0db1946a7022966ccecd398ca3d67
-
SSDEEP
196608:KKpN6u5P4f78uFxXVuU7lvQl2nxTlAudXhBY0cyuWrVxg12VIFteZNg17Z:Nn5OZxXTlQl+xTlAuBhBRcSrDA6JNgr
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sextest.test -
Queries account information for other applications stored on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test:main Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test:s1 -
Queries information about running processes on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test:s1 Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test:main -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sextest.test -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sextest.test -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.sextest.test -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sextest.test -
Schedules tasks to execute at a specified time 1 TTPs 2 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sextest.test Framework service call android.app.job.IJobScheduler.schedule com.sextest.test:main -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 3 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sextest.test:main Framework API call javax.crypto.Cipher.doFinal com.sextest.test Framework API call javax.crypto.Cipher.doFinal com.sextest.test:s1
Processes
-
com.sextest.test1⤵
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4347 -
getprop ro.build.display.id2⤵PID:4755
-
-
getprop ro.build.display.id2⤵PID:4840
-
-
getprop ro.build.display.id2⤵PID:4867
-
-
getprop ro.build.display.id2⤵PID:4900
-
-
getprop ro.build.display.id2⤵PID:4920
-
-
getprop ro.build.display.id2⤵PID:4956
-
-
getprop ro.build.display.id2⤵PID:4984
-
-
getprop ro.build.display.id2⤵PID:5075
-
-
getprop ro.build.display.id2⤵PID:5128
-
-
getprop ro.build.display.id2⤵PID:5158
-
-
getprop ro.build.display.id2⤵PID:5178
-
-
getprop ro.build.display.id2⤵PID:5212
-
-
getprop ro.build.display.id2⤵PID:5239
-
-
getprop ro.build.display.id2⤵PID:5269
-
-
getprop ro.build.display.id2⤵PID:5316
-
-
getprop ro.build.display.id2⤵PID:5342
-
-
getprop ro.build.display.id2⤵PID:5361
-
-
getprop ro.build.display.id2⤵PID:5402
-
-
getprop ro.build.display.id2⤵PID:5435
-
-
getprop ro.build.display.id2⤵PID:5455
-
-
getprop ro.build.display.id2⤵PID:5497
-
-
getprop ro.build.display.id2⤵PID:5523
-
-
getprop ro.build.display.id2⤵PID:5542
-
-
getprop ro.build.display.id2⤵PID:5581
-
-
getprop ro.build.display.id2⤵PID:5609
-
-
getprop ro.build.display.id2⤵PID:5631
-
-
getprop ro.build.display.id2⤵PID:5669
-
-
getprop ro.build.display.id2⤵PID:5701
-
-
getprop ro.build.display.id2⤵PID:5720
-
-
com.sextest.test:s11⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Uses Crypto APIs (Might try to encrypt user data)
PID:4618
-
com.sextest.test:main1⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4603
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD59d03a8fdf101a2c3f5e9cf1c148caa84
SHA1d14aee21d9954308716a41f299fe537f51e6c50f
SHA256e7c4256187d5441e7ce24eaa3e49ff71466dff8bf2a86aaf487ecb0645c7e946
SHA5127dbc20079a3cc820dd75f03e6ad5e480ea5ced4503a60afe2d85edb8a2e9f9b753ed012890169fb8cfe3ed565c581eb0a4949ab166e737eeff245ea9d53c19ff
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
402KB
MD5cf7dae912c2a463e7cc298cb965f262e
SHA191454b20b14fc396fe3ccbf4d0699dfb439715ee
SHA256bd974df6918c47716422c43cd1f50aa0bf2416d2866385da0d9913cbdc9eabf4
SHA512a6fe98ad5a2d304bb86ec89ed4b6789d04fbc7dfcaa9d25db297451fbfddce656b9c138701b44c052ac4ce93db74190c2e43f91ad0e32219aadf5e4c61070394