Analysis
-
max time kernel
149s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
29-10-2024 23:20
Behavioral task
behavioral1
Sample
Kinopoisk Premium.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Kinopoisk Premium.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Kinopoisk Premium.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Kinopoisk Premium.apk
-
Size
5.5MB
-
MD5
ef2f6adfc1c0cffeb33d63a6a79decd7
-
SHA1
3bdcf4f3377df7a1e519dff021901baf6c88ee6d
-
SHA256
83cff53f2544904ca0d6601fc6cbe3687dc093b33127c93bf38e4bfe7992eb0a
-
SHA512
ec0679b355e34f730891da823c03fd15c33a47834b3db161e95c57b7fdc42fb2c333e093ce3daf5f9fdbc6374cda2b3eec315e8e026e376c160dcbc06bcad8c9
-
SSDEEP
98304:kSbq2FnCbaWBCDT7HLi1NLYvs6TH5amIkvFIwMjdaHmzXzB+To0tBPk8j:kSbq2BcC/DcNLA7o+FejdaGzsT5j
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
hour.limited.planneddescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId hour.limited.planned Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText hour.limited.planned Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId hour.limited.planned -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
hour.limited.planneddescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener hour.limited.planned -
Acquires the wake lock 1 IoCs
Processes:
hour.limited.planneddescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock hour.limited.planned -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
hour.limited.planneddescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground hour.limited.planned -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
hour.limited.plannedioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction hour.limited.planned -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
hour.limited.planneddescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo hour.limited.planned -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
hour.limited.planneddescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone hour.limited.planned -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
hour.limited.planneddescription ioc Process Framework service call android.app.IActivityManager.registerReceiver hour.limited.planned -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
hour.limited.planneddescription ioc Process Framework service call android.app.job.IJobScheduler.schedule hour.limited.planned -
Checks CPU information 2 TTPs 1 IoCs
Processes:
hour.limited.planneddescription ioc Process File opened for read /proc/cpuinfo hour.limited.planned -
Checks memory information 2 TTPs 1 IoCs
Processes:
hour.limited.planneddescription ioc Process File opened for read /proc/meminfo hour.limited.planned
Processes
-
hour.limited.planned1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:5049
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD522fdc0f0e22a94acb8e5050fbee87cc6
SHA17e31d580df82fef3b30e3b7060560712081a020c
SHA2561a3b99f1b0e1d580a1da1db50a3aa3aa9845ddb1c394b392c7c7aaa9dc32f9f5
SHA5127841e38ecaeda886ec2ca3e90f22fa9aea3006a9160ce856f6449cdc7a969e9917c8f1c8478efae6b749746d2d43092a6a76d3817fb020f082afd1d20aa5b6cb
-
Filesize
37B
MD5fcc8492cd38c9884b8100e9e506b59e7
SHA1b67994ea055f13c24c3fc932f46e4fb8d43d6fd3
SHA256a0a11cbd1724ada4097f4e4cfcbd70f1887044322739115e6bb5e8700f5594a1
SHA5129ac8bba4cb3155142fb9a0049ca181ade30bdfb6eb9e636508c26b2c8727e1180459dc807f575bc6f747ad578b11300b49e79d786efd4105919c9b1929b08bbd
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
288B
MD5a416eb24ae66d475e05ecba2567dcd5b
SHA10e594181cf4cde0c00184bb457d49cd2ab13b5e2
SHA25627eecee3bc2d5a6b5b17ad40455117a25de84902dd1def314b1b4e30bb9282bb
SHA512f8a3409b1fc80d269a7374f807cfb08d740244b27695b7d9bc5ce3608dd271bca3a30cfd9f282845ec037d935b263138f1e1fb93c31d2105d650d162311db293