Analysis
-
max time kernel
59s -
max time network
60s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
31-10-2024 07:40
Behavioral task
behavioral1
Sample
ready_.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ready_.apk
-
Size
3.7MB
-
MD5
3d225bb3f5b792172e992fda21b051c0
-
SHA1
10487255cbf047d091b466067e9c00eaa6ad43c3
-
SHA256
89f216b446d5a1d6d1ada30278f4e5019a4613bf32707f2f170cf211649fdeb0
-
SHA512
7aa42185e1fd998382d01d86980f5cb4c5e8a188f820e1edad2d7d31019bd310e261cc85901cdd8538b8ec74abf49558f56e2aa114c37d818f072f836110040e
-
SSDEEP
49152:2L3ikdXzdGGHQTOOmzQn5Yqr0cga0U0jUAafdzmbgdtZWKI/waqe8/2ZmaBGF:cXzBwTBmzQnJ0ttwAiqbgdtZFaway
Malware Config
Signatures
-
Processes:
compute.users.remainedpid process 4463 compute.users.remained -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
compute.users.remaineddescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId compute.users.remained Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText compute.users.remained Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId compute.users.remained -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
compute.users.remaineddescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock compute.users.remained -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
compute.users.remaineddescription ioc process Framework service call android.app.IActivityManager.setServiceForeground compute.users.remained -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
compute.users.remainedioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction compute.users.remained -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
compute.users.remaineddescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo compute.users.remained -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
compute.users.remaineddescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS compute.users.remained -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
compute.users.remaineddescription ioc process Framework service call android.app.job.IJobScheduler.schedule compute.users.remained
Processes
-
compute.users.remained1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4463
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD50ffca1a19a01f549b580d044540e497d
SHA18b9136527e2565cd02abf940a74720d84399c3ff
SHA2567d21efff09f9906ab70f11700318139358fee2ad092af62f98c1124f4ad8fd6d
SHA5127fed4ad3642476207c91c4873d0b82614b68f7ca3397e0932601df95101d4c062e3a8bfd2641610f7baa756f91eccebc7e9ed0e60560f2b6ce92ce372e226428
-
Filesize
29B
MD5ea2cd29c192da6b91c2d9c5ab7871659
SHA1fbc2f5f7cba4581aa7788645826fc56b542f88e8
SHA256f33d22e972838b1c4322a0bd77e1b0abe1b1a01bec7454fac71a698154749301
SHA5127078fa705af06cff9072101120e9c6ff7454785bd564cafeb6f15825c3373887154a6ab2a18d2823ce0fc1d042d04de6aad87e7f682f246ca498b2fe5cf8cdfa
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
280B
MD58f532a887c9ac713ddcca2f21fe1ffda
SHA1d39d00b5cc149a6bf866eb38cee2e0977fb7a8d7
SHA2560e4ed17a49c892d6494e5d2b72c12c7d4544cb68f03ced1a3ef91ee8e4b8a654
SHA5120ce690fa67740b8e4ec9af65bd74d6aab50da820dd48f650c59fe6e4aade71a4c85aaa592d31aa2517da5496e376f4f40c59313afe60ef65862732ad8f788073