Analysis
-
max time kernel
149s -
max time network
154s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29-10-2024 23:03
Behavioral task
behavioral1
Sample
Predator (2).apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Predator (2).apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Predator (2).apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Predator (2).apk
-
Size
8.5MB
-
MD5
be3efd3f3fa862239c36e5f1314ecb22
-
SHA1
e28bc5dc50f06de1aa95c9b62f14426f17ec9c5e
-
SHA256
d2c2b10763c87c50ef37c323707edab8f9574df4ff5428db22e04dc161d1a175
-
SHA512
96bf81909489d9d34c78912ae5db604fc7391055cad31299c7ddfae7afb292e3418e4ae19ebea7b466d94a3101efc6372648f8cce4d60da22435d6803382c323
-
SSDEEP
49152:3uHu1fhWnH2/y3oibOoTCjXXKn9PV9AmzhzdGGuQTO0iU0Yq80cgp5RRoLG:3aOfhWHUookYjw99AmzhzBBT30tpaS
Malware Config
Signatures
-
Processes:
yale.functional.possiblepid Process 4263 yale.functional.possible -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
yale.functional.possibledescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId yale.functional.possible Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText yale.functional.possible Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId yale.functional.possible -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
yale.functional.possibledescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock yale.functional.possible -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
yale.functional.possibledescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground yale.functional.possible -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
yale.functional.possibleioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yale.functional.possible -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
yale.functional.possibledescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone yale.functional.possible -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
yale.functional.possibledescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS yale.functional.possible -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
yale.functional.possibledescription ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS yale.functional.possible -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
yale.functional.possibledescription ioc Process Framework service call android.app.IActivityManager.registerReceiver yale.functional.possible -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
yale.functional.possibledescription ioc Process Framework service call android.app.job.IJobScheduler.schedule yale.functional.possible -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
yale.functional.possibledescription ioc Process Framework API call javax.crypto.Cipher.doFinal yale.functional.possible -
Checks CPU information 2 TTPs 1 IoCs
Processes:
yale.functional.possibledescription ioc Process File opened for read /proc/cpuinfo yale.functional.possible -
Checks memory information 2 TTPs 1 IoCs
Processes:
yale.functional.possibledescription ioc Process File opened for read /proc/meminfo yale.functional.possible
Processes
-
yale.functional.possible1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4263
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175B
MD52c4c6ef5298c234c7a4f4209cdfdbce7
SHA1886745650b08bd0eb88b8265657d90288493a394
SHA256731db9fa1212c62e1206e29c0536b7340507b1cedc89eb559e91779c5794e9a7
SHA512762e2ca697af4203bfcad3f00c06b7ad9d88ee074294f197f45a53db867037be262cb0f9f4ce88902bff6b4a42710fdd06c7b3d8b9f4ae5a43d4390753e827d9
-
Filesize
65B
MD555fb7df4a7c924b98d708ccc6c2c1e73
SHA14701a9967c19990d7f6be9c78de4b4a751ed686d
SHA2569b349925de6eac7bd227b612533fadee959d4a05f618acb69565e9916bd371e8
SHA5124f7a13f14192225c72a9ec8bde546e17b20521b920ed90c50e0ebe35c78a3c48f15626f8055ae970b8cca013a46e95c4111e4325b4c5f1c414590ec7f34cee10
-
Filesize
110B
MD5cf5b2aa23c0fbbecd64f162e49a90d48
SHA102dd698d3a262aa8d4b43e6bd06ba056fff6b71a
SHA256941c557b37f945bd14e3844844538043e2fe8c473e6756c6dd8ccb00d2fdfcc5
SHA5124bafe817aa37dc7760c1a9c587168c962e18343563c7e2daf8930caac8845df887d4b142e7f83103edef62d6bdef6cbb59c19ad9b44d4cd2f114864bce5bb822
-
Filesize
154B
MD51bd5b700c01cbd5054fd528aad057907
SHA1acac5ba8d39a189a03330c60731401cf8b303607
SHA256bac90416d5c3ea41c1d2bcd27b2aefc085630c1b0cdd52346f785641e8744028
SHA5126b15f8b39e595344fa993bde9459a23a131ba1a503347d20006dcc052e532de59979f878d7084744a634593bc3126cdeefc2b06a0fbc4afe47908fb8564b767d
-
Filesize
25B
MD5749af3b8d53606c7777359dff271710a
SHA138c222bd446af5f06b689e6d1edb6be053dc1918
SHA256507d4a875476633d215eb27e67af2b56c3b12b3403328781850508da7c17a5af
SHA5121bf956585a5d3c2b246e2f4b05292d28776172257599d71f246404b8124450be8a110b37111f929d1717c8bcb414c99ccb490d98f192b7e6e31dfde7c2bacccc
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
276B
MD54ef6d78c9fc241e99dd600e4fa6ebd95
SHA115dcb9d30695ce0b3e49a13cfa809721c8d65975
SHA256ae77c9153566fa4b672678c7a9ce704dc504f0f8374c94d59ddb7c37d3c2fd14
SHA5129003647344a0cd86cb6724b907f287cb28e03bc308afe0ec3ae23b14358e1a73900f54612231b58587395262481e13f58296c25a6dfa303edbfbf95878be3e33
-
Filesize
588B
MD559f10ca438be3e3e42ff9028c18a34c9
SHA19ac590b3b03410ebc3cca34e526553d6c4397cf2
SHA25652c45c7e26b1229e4f93abf945ac770602ae340e1dcb6e43eaded15b18aa0db4
SHA512e44c0684844a3b415924142b08b5b69a0f8e13e44c3297ad61450f0d9c64ef299a4aebaa6fcd007001ff195f17f1e0d9f96e451b33b71c5d6f8bb74a70353c7f