Analysis
-
max time kernel
148s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
22/10/2024, 01:31
Behavioral task
behavioral1
Sample
782c6b2dad7cfc1f731c41653427e4d47f78a87f0ebc7041a8cc810204494c40.apk
Resource
android-x86-arm-20240624-en
General
-
Target
782c6b2dad7cfc1f731c41653427e4d47f78a87f0ebc7041a8cc810204494c40.apk
-
Size
13.3MB
-
MD5
8031c03fe33aafcba5e78ecead0af4e0
-
SHA1
dc5b708c783f39c9b0af4962c7f4114207081321
-
SHA256
782c6b2dad7cfc1f731c41653427e4d47f78a87f0ebc7041a8cc810204494c40
-
SHA512
88dfe10ac77a9b975adf05c3c557cbbdbe99dd4ec256b8dd2ff7b75db2d1a389d5f8bd3820c193ce8d0f2bcd1f042a7b810ed8500b40761fac0184e269ca37b2
-
SSDEEP
393216:znjCKxXXhp97Y68kPIAlcFgGKCE7KmDOgg:zG8hP8kQA6SKmDOJ
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sextest.test -
Queries account information for other applications stored on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test:main Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test:s1 -
Queries information about running processes on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test:main Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test:s1 -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sextest.test -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sextest.test -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.sextest.test -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sextest.test -
Schedules tasks to execute at a specified time 1 TTPs 2 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sextest.test Framework service call android.app.job.IJobScheduler.schedule com.sextest.test:main -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 3 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sextest.test Framework API call javax.crypto.Cipher.doFinal com.sextest.test:main Framework API call javax.crypto.Cipher.doFinal com.sextest.test:s1
Processes
-
com.sextest.test1⤵
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4360 -
getprop ro.build.display.id2⤵PID:4758
-
-
getprop ro.build.display.id2⤵PID:4874
-
-
getprop ro.build.display.id2⤵PID:4905
-
-
getprop ro.build.display.id2⤵PID:4934
-
-
getprop ro.build.display.id2⤵PID:4955
-
-
getprop ro.build.display.id2⤵PID:4996
-
-
getprop ro.build.display.id2⤵PID:5021
-
-
getprop ro.build.display.id2⤵PID:5103
-
-
getprop ro.build.display.id2⤵PID:5168
-
-
getprop ro.build.display.id2⤵PID:5199
-
-
getprop ro.build.display.id2⤵PID:5218
-
-
getprop ro.build.display.id2⤵PID:5258
-
-
getprop ro.build.display.id2⤵PID:5286
-
-
getprop ro.build.display.id2⤵PID:5320
-
-
getprop ro.build.display.id2⤵PID:5361
-
-
getprop ro.build.display.id2⤵PID:5390
-
-
getprop ro.build.display.id2⤵PID:5410
-
-
getprop ro.build.display.id2⤵PID:5451
-
-
getprop ro.build.display.id2⤵PID:5478
-
-
getprop ro.build.display.id2⤵PID:5500
-
-
getprop ro.build.display.id2⤵PID:5543
-
-
getprop ro.build.display.id2⤵PID:5574
-
-
getprop ro.build.display.id2⤵PID:5593
-
-
getprop ro.build.display.id2⤵PID:5635
-
-
getprop ro.build.display.id2⤵PID:5663
-
-
getprop ro.build.display.id2⤵PID:5683
-
-
getprop ro.build.display.id2⤵PID:5725
-
-
getprop ro.build.display.id2⤵PID:5758
-
-
getprop ro.build.display.id2⤵PID:5777
-
-
com.sextest.test:main1⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4453
-
com.sextest.test:s11⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Uses Crypto APIs (Might try to encrypt user data)
PID:4479
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5f2b7d772e26d515f85b9d6fd804ad6bb
SHA1fdd2c1869d1e790a81a85f039e6cadd0d7bd27bd
SHA2560e01d5166e6ff1fb4043a743fbe393bdaa7677456fab9e7f8deb5fc0867f1fc0
SHA5127de7989fe9f457955874c7cb9416c325a164f5140fa850eeb78a4ccc41b65185c338327f326053cf979e3271d7363902ca30a12c0e565bea9993ea88f2b9a61e
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
402KB
MD54d0e3a465f4d3da696e40de6de0217c0
SHA15cfe950661737704e121b189420cae57e370c04e
SHA25679a9ba1d25231d2eb97645a77c3f2734e6ab9be90241ae7f021824ef6fc8a2bf
SHA512b963bdaf1c256a278661fb21fcec1715c365d7c063ec946000e4f4fc6f98aef2c6765eead895f884fdd43a9b80034188613d8f9a6a39c033cb826f2276d3309b