Analysis
-
max time kernel
59s -
max time network
69s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
31-10-2024 04:41
Behavioral task
behavioral1
Sample
ready (5).apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ready (5).apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ready (5).apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ready (5).apk
-
Size
3.7MB
-
MD5
a764b51401369928cac94b20fc911d4b
-
SHA1
882f51f73905e8a9e297ff7fcc24e1e82a2087a1
-
SHA256
d23d13dba8d480034510a14932ba0819db013fc279302e5c6f9badfbbf378441
-
SHA512
8ce522ea96adfde150d1ee49bc3a682edfe946f4e0b0d1523f2006d20e0ee88b0ae921515b42740609ed75ffc287b287390bf60468cd5cb5b6f4c5fdb3389926
-
SSDEEP
49152:VjUAafdzmbgdtZWKI/waqe8/2ZmaBGJymz/zdGGCQTO3gU4YqG0cgo+ML3ikjoE+:VwAiqbgdtZFawasymz/zBtTi0to+gT+
Malware Config
Signatures
-
pid Process 4492 compute.users.remained -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId compute.users.remained Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText compute.users.remained Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId compute.users.remained -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock compute.users.remained -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground compute.users.remained -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo compute.users.remained -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS compute.users.remained -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule compute.users.remained
Processes
-
compute.users.remained1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4492
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD50ffca1a19a01f549b580d044540e497d
SHA18b9136527e2565cd02abf940a74720d84399c3ff
SHA2567d21efff09f9906ab70f11700318139358fee2ad092af62f98c1124f4ad8fd6d
SHA5127fed4ad3642476207c91c4873d0b82614b68f7ca3397e0932601df95101d4c062e3a8bfd2641610f7baa756f91eccebc7e9ed0e60560f2b6ce92ce372e226428
-
Filesize
29B
MD5ea2cd29c192da6b91c2d9c5ab7871659
SHA1fbc2f5f7cba4581aa7788645826fc56b542f88e8
SHA256f33d22e972838b1c4322a0bd77e1b0abe1b1a01bec7454fac71a698154749301
SHA5127078fa705af06cff9072101120e9c6ff7454785bd564cafeb6f15825c3373887154a6ab2a18d2823ce0fc1d042d04de6aad87e7f682f246ca498b2fe5cf8cdfa
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
280B
MD58f532a887c9ac713ddcca2f21fe1ffda
SHA1d39d00b5cc149a6bf866eb38cee2e0977fb7a8d7
SHA2560e4ed17a49c892d6494e5d2b72c12c7d4544cb68f03ced1a3ef91ee8e4b8a654
SHA5120ce690fa67740b8e4ec9af65bd74d6aab50da820dd48f650c59fe6e4aade71a4c85aaa592d31aa2517da5496e376f4f40c59313afe60ef65862732ad8f788073