Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06-11-2024 02:40
Behavioral task
behavioral1
Sample
5415d740f286a1ff7f7a22df18a9910c66841402a151a37b7fb2bb673b1cf63b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5415d740f286a1ff7f7a22df18a9910c66841402a151a37b7fb2bb673b1cf63b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5415d740f286a1ff7f7a22df18a9910c66841402a151a37b7fb2bb673b1cf63b.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5415d740f286a1ff7f7a22df18a9910c66841402a151a37b7fb2bb673b1cf63b.apk
-
Size
64.0MB
-
MD5
b261bda3ea80addbea9e282f840ebe10
-
SHA1
660ea4e4177fddd07ad4aa70eed41d100e6c9938
-
SHA256
5415d740f286a1ff7f7a22df18a9910c66841402a151a37b7fb2bb673b1cf63b
-
SHA512
ef9848686f672dcb9df064bc2b8abc4735009a7d20b8ab600274546eb060b24dc07277633e3ab9eb0baadbca327339f7b1d283d83961c2c8c8bd1a4068f6958c
-
SSDEEP
1572864:5DaeuGCBiCYbdIqLcuc4ET4SoxM1m/9DlQrct2zOSj5KF+Be:pCcdBct4Dx7pQYq/Ur
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
rel.competition.closerdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId rel.competition.closer -
Acquires the wake lock 1 IoCs
Processes:
rel.competition.closerdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock rel.competition.closer -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
rel.competition.closerdescription ioc Process Framework service call android.app.IActivityManager.registerReceiver rel.competition.closer -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
rel.competition.closerdescription ioc Process Framework service call android.app.job.IJobScheduler.schedule rel.competition.closer
Processes
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
29B
MD50330478a07d4b5e0488ccf196966c176
SHA17e0ad1f9ece697fdfb4757d53ba3b1ba247bbd2a
SHA256bfa96b5b81ec911eb68b5bfc3c3d669dfa97e2cdbb53e1fe0d05b177fc4f285a
SHA51250e75409d9db149e05001ff27e863bc2f6278f8d42b1c7b1ed1c1bfff9fa6c8fe2219a107c8d95ef93cf698b91e409224693175538c5d5a6793e0d971791ce4a
-
Filesize
45B
MD554c6a11bcfee5ba7ba120c25db4c3ea2
SHA184ace4968ffaca96ceb4963474d0982b5aa7f8b9
SHA256ba02e9b68f9ce65fca9fad4f1aaad7bf04a06d0a4518d6be015d98010b410f34
SHA512e4c5c7cc1d8f9e88ecea91408eca461daeb659a52b5f17e10bb33f50b8ee5e9255124c4c0af4bd186756bd36b08a76398858709556fafb625d45303b75df9d2e