Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    27-10-2024 22:07

General

  • Target

    159a7af39c0d6c2334df77088fe2d545a96d591dbf2b85c373a4a45377f492c4.apk

  • Size

    4.2MB

  • MD5

    68139c9e7960d3eb956472bdc5ed5ad2

  • SHA1

    dba76029847dce4aa71d0e48bdf7cfe7e0174f35

  • SHA256

    159a7af39c0d6c2334df77088fe2d545a96d591dbf2b85c373a4a45377f492c4

  • SHA512

    3efa922963f3d754eace54187875aa41be3a5fa353c4e217c6c3424aedb5fd7e00932ccd163288e7c34b906ffdfaf849f79f5b2bac0557301361f696cdfe541e

  • SSDEEP

    98304:s1H2sNAKHdW7C31CrRpPc1qYSUITkBElGfZnGp972k0OOnbG8h:s1Q7C+pmqJr0zfZGpYrA6

Malware Config

Signatures

  • TgToxic

    TgToxic is an Android banking trojan first seen in July 2022.

  • TgToxic payload 1 IoCs
  • Tgtoxic family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.example.mysoul
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about active data network
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4954

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.example.mysoul/app_grief/wH.json

    Filesize

    1.5MB

    MD5

    cda4ec8948b2584cb84b70db63e8124b

    SHA1

    67103cf617a10dd32ffabd036ac92cce434f1add

    SHA256

    9ae46f49937c95780156f36b4577ec05bac59a8f5e51dcb245885c68257302e2

    SHA512

    b46e2df21bff89c315e6e64c8df795c808eebc2978ea38f6aa4bc396c332ea531593a792bd127f8633687d9d049cfa9b664f02b15578b9e41a56ad3057b0d4d8

  • /data/data/com.example.mysoul/app_grief/wH.json

    Filesize

    1.5MB

    MD5

    a941cf153c00a6df4392d3d4bdfda7b1

    SHA1

    b568b8ba0fad3590bf9c9d680a96a9e05545d940

    SHA256

    64eea7cf82606726872f116e49f89af8a1ccafcff747f78dedef46d5618f4a02

    SHA512

    e2d4136d51c19c9fa4d74aa835bd9a9d0efd0ac41bd26be439150f7fe788828b41d88e5708aa0a5ad449e8b294e9e7e527de66f0474d37f80fc3d8d0be5df0e1

  • /data/data/com.example.mysoul/cache/sb114112662931042774820.mp3

    Filesize

    940B

    MD5

    fd42b38a64ffb153df0fc0d1cedf780f

    SHA1

    21ab32c80465f7f1a760bedf4782a6292220f31a

    SHA256

    b5d7217edaf72ae337e805c1cf70cf5d4697e2c62a1c7d2ec51e78b5399927ba

    SHA512

    916026ce46e5b40bc5bf9b6705c4160d87a432e533ee8490d8f2013c114d85eab3bfa4f0f621c2e658c20fe377cd12f470ee0162ee64831322c237de6d1bd7f9

  • /data/user/0/com.example.mysoul/app_grief/wH.json

    Filesize

    3.4MB

    MD5

    1ef35068c2219a60eaf997eb30fc80a3

    SHA1

    4b93bb6b12d1fcf8aff67df3269e280438ce0588

    SHA256

    42a8314562b8e32ad4aff7a65d6eedec79b599d767f731cc4947678f8cffaad2

    SHA512

    9ff5ff4fd5489ad5862428a39f92bfd27e8b852a70c45ff06d506fabd95b081420bcf60ba158ad44d439d2f7e78e6e1ccad2f63f26edc99f62fa4566654f8b46