Analysis
-
max time kernel
119s -
max time network
115s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
30-10-2024 21:50
Behavioral task
behavioral1
Sample
Video Chat.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Video Chat.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Video Chat.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Video Chat.apk
-
Size
5.5MB
-
MD5
aceb5d8973efc2f723ef61d3a2d3ce20
-
SHA1
5c08ad2acc3836ae50558b9f2ea09c73d7857ce4
-
SHA256
17da70a429721de61126286bea5d6b73b29d88af5afe8d8f390c2d224f053c9f
-
SHA512
f0b3da53b48d91928d00d5a091a9a5f12bf7d86eeddabeac83556ded3846f1e96bdbe1bae858f36fc37b6892f59dee3ea2bb09d2bcad44c0c84128bbc8ee299f
-
SSDEEP
98304:PMzfd7bJiVO44DEBGNXqaSwhQ1qNkstgYMI1mzBzBjT90tJYnJ:0zfhJiVONQGNaaG17sgI4z7yO
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
maldives.employers.batchdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId maldives.employers.batch Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText maldives.employers.batch Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId maldives.employers.batch -
Acquires the wake lock 1 IoCs
Processes:
maldives.employers.batchdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock maldives.employers.batch -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
maldives.employers.batchdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground maldives.employers.batch -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
maldives.employers.batchioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction maldives.employers.batch -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
maldives.employers.batchdescription ioc process Framework service call android.app.IActivityManager.registerReceiver maldives.employers.batch -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
maldives.employers.batchdescription ioc process Framework service call android.app.job.IJobScheduler.schedule maldives.employers.batch
Processes
-
maldives.employers.batch1⤵
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4930
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD5c1105d6171bdc18c71fcb5019a019dd7
SHA10a51b52559c2520e3f39492618c9c44385003da8
SHA25612dfcc374525ac4ea12167909e90bfa9dd5b793c7cb7c8ea583a26eb5dd622e1
SHA5127ce9cd7b434024fb47a1292fc868074c742fba4c87b87d551e19a19c864a080c77add78771a87f6b8ba0b1613b8044e03bf59b59a8e22e0f9ee4605e914c1d94
-
Filesize
25B
MD564dbcc8c346078c754d1b3c186294726
SHA1415bdf24501a28d704691e26d6b3e832b43518f0
SHA25660440f36c41d7c9c1b61a30e0dd06a35d004c1a71675c4b1ee1b52aa6e4eb3d4
SHA512afceec56bae1ba3c15e41a4bfce9dab3faa1ab371ee635351b94e51bb4579680cc3e38f23d901b8a5bd8e8a37cc61cae3bd358392f1ce4f997c649af10745999
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
280B
MD549880e71990ebbdcf913fc21bea2b5bb
SHA17eb74e83fde477f32e9a7cc437820b461393aa4c
SHA2561ebf72081182b3e82fb61652b94f2f9a6863e94a6684c5c5d2f644bb48844a56
SHA51269f5e27a9bd91cdf2cc9ac6ad753ff1befa1c836d03f79b958833d036a020ad95c412cf0c5daa359ea567f3fb2ade17ccd5affba40dfeefc6e8472075976043e