Analysis
-
max time kernel
299s -
max time network
297s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
22-10-2024 14:00
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
ready.apk
-
Size
6.2MB
-
MD5
24d0f3802c0891d625fac917a940936c
-
SHA1
36ad393f4687a676efb2fc0d62a6532c17eb89ab
-
SHA256
62b002528c334cec9d29d6126ef1b935d10f3b1796cb6380254045189553185d
-
SHA512
23f65fbce631f3f97eb65f4dbb01b0495ef84a50de5bbfe4bffbfc66040b83480678b1071e2c9d49ba4681a972dc04304e81570f68669be507b93c4607029fd7
-
SSDEEP
24576:lXvLvTSt4jfa4zBj2mFXs8WFuiWUFutbF:lXvFO4zBKmFaFuHtp
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
vessel.wax.phrasesdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId vessel.wax.phrases -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
vessel.wax.phrasesdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener vessel.wax.phrases -
Acquires the wake lock 1 IoCs
Processes:
vessel.wax.phrasesdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock vessel.wax.phrases -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
vessel.wax.phrasesdescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo vessel.wax.phrases -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
vessel.wax.phrasesdescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS vessel.wax.phrases -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
vessel.wax.phrasesdescription ioc Process Framework service call android.app.job.IJobScheduler.schedule vessel.wax.phrases -
Checks CPU information 2 TTPs 1 IoCs
Processes:
vessel.wax.phrasesdescription ioc Process File opened for read /proc/cpuinfo vessel.wax.phrases -
Checks memory information 2 TTPs 1 IoCs
Processes:
vessel.wax.phrasesdescription ioc Process File opened for read /proc/meminfo vessel.wax.phrases
Processes
-
vessel.wax.phrases1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4337
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5da25c7bff55a2936a9cb811d9fe27d93
SHA187711aa4a1ee842a6d0cf50a254c742e853b48a5
SHA25649ecccba597e47651a3dc051292ed5b1c89a9c36a0e85bff287c2127b3330be5
SHA51251d114639fee48a61618964fb064562b7cf3b1dc29accce57ab1e99f9fb6593c4727671ee4a23caba7f157adf294ef5734ec6f910f596f35b4c2ed7231f76c6c
-
Filesize
21B
MD540fcf48a4ecdb632240619eb756772ce
SHA183706b0dcc3ff8032962dcd0d73a36ba65dd6f30
SHA256d153cc76e9f7a12c26dbe0d197285a77fc8efeed1b1f3d35c25ba386711b5c80
SHA5124757ed0904a24ed77c8c2dca9be96f084cebc54a93c43eb0eb27545aba7e58916abb0b639254d90ebffea1e760b85d0a0fe53ada28194734748116475dd9829b