Analysis
-
max time kernel
59s -
max time network
45s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
31-10-2024 06:19
Behavioral task
behavioral1
Sample
Phone-Poisk (2).apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
Phone-Poisk (2).apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
Phone-Poisk (2).apk
Resource
android-x64-arm64-20240624-en
General
-
Target
Phone-Poisk (2).apk
-
Size
3.8MB
-
MD5
bb9da161cfa71608b81807515e26aa45
-
SHA1
be40ceb2377b747dea41068b87940f0bd455a07d
-
SHA256
b856b0f127ba793f3674649c86b85e8e2641087b1103cb5cda27e8f27f8bfee1
-
SHA512
4b16a2b276e5b96f80845c7490fc8738403dbe7c292a71bde3d31b5a985ee6a0a9e7617a2438251e3b311ba93ff0df7b505754707f235460c95dc6805ebc13f4
-
SSDEEP
98304:8iZP7X9Mr7tMLsd7gE6mmzxzBPTB0txyOzu:8ixXur60gE6RzXelu
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId rare.dive.qld Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText rare.dive.qld Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId rare.dive.qld -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock rare.dive.qld -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground rare.dive.qld -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction rare.dive.qld android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction rare.dive.qld android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction rare.dive.qld android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction rare.dive.qld -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo rare.dive.qld -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS rare.dive.qld -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver rare.dive.qld -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule rare.dive.qld
Processes
-
rare.dive.qld1⤵
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4255
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD5e7f0573f080521e148d149253a2f0866
SHA1c929a8b2cfb96177168bb6cf1ee76390296a5a0b
SHA256f41136912480e8282a98115b403e704e5e648a8a27905210286be3835e5ee76c
SHA512568ac16a5fb7989392073a6d700e1033207c9e912b9f5b430120caf0ca050ebc47bf521508cb9eea3bf61d987c591382dd6b33b0ab914d47b9319098ddfcf1bd
-
Filesize
29B
MD530866f03e91769468ea37ec42a7d36c8
SHA19ff1ef07806bc107587f26c1acd7c5d83dd460c5
SHA256f6a76566acd5f103e575f3c1177ca14e157634bf436f9c103abd20034dd1bc07
SHA51262c70f8ff82e2b6dc9fe3ea7db288d37dafacc1c6d8452e576789cc2577a39b3081398dfe92abad140632ef4cbe858a31e03fbc49d63ce8b06c568c46707ac36
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
280B
MD582887f534b616b2087d2899b1e23a15a
SHA1789b9212aeb8cb2da7f3fe535afad381fc6a06ef
SHA256a93a31c486c605f525c6ff006ea3ae2a24e8b492df7455a7e697315770f9db73
SHA51273ba1390753c77c9848829a1a20f46fe4fc92a0badccafe7137d0360227f5fa0ae0d46cf6bf957f990ac2b44b326568b8ffcfe4f98b9ef358a16dfb35a8e7316