Analysis
-
max time kernel
149s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
27-10-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
159a7af39c0d6c2334df77088fe2d545a96d591dbf2b85c373a4a45377f492c4.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
159a7af39c0d6c2334df77088fe2d545a96d591dbf2b85c373a4a45377f492c4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
159a7af39c0d6c2334df77088fe2d545a96d591dbf2b85c373a4a45377f492c4.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
159a7af39c0d6c2334df77088fe2d545a96d591dbf2b85c373a4a45377f492c4.apk
-
Size
4.2MB
-
MD5
68139c9e7960d3eb956472bdc5ed5ad2
-
SHA1
dba76029847dce4aa71d0e48bdf7cfe7e0174f35
-
SHA256
159a7af39c0d6c2334df77088fe2d545a96d591dbf2b85c373a4a45377f492c4
-
SHA512
3efa922963f3d754eace54187875aa41be3a5fa353c4e217c6c3424aedb5fd7e00932ccd163288e7c34b906ffdfaf849f79f5b2bac0557301361f696cdfe541e
-
SSDEEP
98304:s1H2sNAKHdW7C31CrRpPc1qYSUITkBElGfZnGp972k0OOnbG8h:s1Q7C+pmqJr0zfZGpYrA6
Malware Config
Signatures
-
TgToxic
TgToxic is an Android banking trojan first seen in July 2022.
-
TgToxic payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.example.mysoul/app_grief/wH.json family_tgtoxic -
Tgtoxic family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.example.mysoulioc pid process /data/user/0/com.example.mysoul/app_grief/wH.json 4954 com.example.mysoul -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.example.mysouldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.example.mysoul Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.example.mysoul Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.example.mysoul -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.example.mysouldescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.example.mysoul -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.example.mysouldescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul -
Acquires the wake lock 1 IoCs
Processes:
com.example.mysouldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.example.mysoul -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.example.mysouldescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.example.mysoul -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.example.mysoulioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.example.mysoul android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.example.mysoul android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.example.mysoul android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.example.mysoul android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.example.mysoul android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.example.mysoul -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.example.mysouldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.example.mysoul -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.example.mysouldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.example.mysoul -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.example.mysouldescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.example.mysoul -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.example.mysouldescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.example.mysoul -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.example.mysouldescription ioc process Framework API call javax.crypto.Cipher.doFinal com.example.mysoul -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.example.mysouldescription ioc process File opened for read /proc/cpuinfo com.example.mysoul -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.example.mysouldescription ioc process File opened for read /proc/meminfo com.example.mysoul
Processes
-
com.example.mysoul1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4954
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5cda4ec8948b2584cb84b70db63e8124b
SHA167103cf617a10dd32ffabd036ac92cce434f1add
SHA2569ae46f49937c95780156f36b4577ec05bac59a8f5e51dcb245885c68257302e2
SHA512b46e2df21bff89c315e6e64c8df795c808eebc2978ea38f6aa4bc396c332ea531593a792bd127f8633687d9d049cfa9b664f02b15578b9e41a56ad3057b0d4d8
-
Filesize
1.5MB
MD5a941cf153c00a6df4392d3d4bdfda7b1
SHA1b568b8ba0fad3590bf9c9d680a96a9e05545d940
SHA25664eea7cf82606726872f116e49f89af8a1ccafcff747f78dedef46d5618f4a02
SHA512e2d4136d51c19c9fa4d74aa835bd9a9d0efd0ac41bd26be439150f7fe788828b41d88e5708aa0a5ad449e8b294e9e7e527de66f0474d37f80fc3d8d0be5df0e1
-
Filesize
940B
MD5fd42b38a64ffb153df0fc0d1cedf780f
SHA121ab32c80465f7f1a760bedf4782a6292220f31a
SHA256b5d7217edaf72ae337e805c1cf70cf5d4697e2c62a1c7d2ec51e78b5399927ba
SHA512916026ce46e5b40bc5bf9b6705c4160d87a432e533ee8490d8f2013c114d85eab3bfa4f0f621c2e658c20fe377cd12f470ee0162ee64831322c237de6d1bd7f9
-
Filesize
3.4MB
MD51ef35068c2219a60eaf997eb30fc80a3
SHA14b93bb6b12d1fcf8aff67df3269e280438ce0588
SHA25642a8314562b8e32ad4aff7a65d6eedec79b599d767f731cc4947678f8cffaad2
SHA5129ff5ff4fd5489ad5862428a39f92bfd27e8b852a70c45ff06d506fabd95b081420bcf60ba158ad44d439d2f7e78e6e1ccad2f63f26edc99f62fa4566654f8b46