Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-11-2024 03:41
Behavioral task
behavioral1
Sample
d021bc1ec9819f8223e21c591acb4ff15c32751fb34ae2bdc4f813d13bf87ee4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d021bc1ec9819f8223e21c591acb4ff15c32751fb34ae2bdc4f813d13bf87ee4.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d021bc1ec9819f8223e21c591acb4ff15c32751fb34ae2bdc4f813d13bf87ee4.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d021bc1ec9819f8223e21c591acb4ff15c32751fb34ae2bdc4f813d13bf87ee4.apk
-
Size
9.4MB
-
MD5
03d74cf6adff84199aadc3c6196f8cd1
-
SHA1
c3ea92435c99118c354a4898191987b2b04e7577
-
SHA256
d021bc1ec9819f8223e21c591acb4ff15c32751fb34ae2bdc4f813d13bf87ee4
-
SHA512
7c39016fadb0c8cc492ea18c42ae92a7a61af2b7b6a4597bca0f3d9f2e9a266bb9ce7f9a2e5163dfeae73c56049da70c1cd8615998e029673f8bd9cfe0c13f8c
-
SSDEEP
98304:ENo+NRZyyzrnqyQd4RsDO7LAYRHemzZzB9TO0txGeW/j:Eag1zr44iDWLAKH5zZ1cj
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId extraordinary.metal.refer -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock extraordinary.metal.refer -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 25 1.tcp.us-cal-1.ngrok.io 87 1.tcp.us-cal-1.ngrok.io 140 1.tcp.us-cal-1.ngrok.io -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground extraordinary.metal.refer -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule extraordinary.metal.refer
Processes
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
41B
MD5aa2ee7a3f07c5324ffdca3405dd2e249
SHA12d48b3472fca60ca317e1c86afb24258f5e1cff1
SHA256dc40d46d3ecb21c4677f97448672bf03883640f9387ab71183aa4f9aeaea3583
SHA5129c3f4a4fe078eaf1388afa5732b721fa7dd6c0645312f9cbcd3001496094aa392bf34e8d3071b595f1583beae3928847c9f47896d92287327e558e9e6e1e5287
-
Filesize
37B
MD564b095dd5ac881ec56b77fb9d2893c0b
SHA160a049b02a1a761191ddbbf4321fa678fccedb57
SHA256697c9cffdaf7cf5c92e06ff22ce930ab8ad2a00ff974561f26dcd54f1952ec6e
SHA51233919c7c35d89e1eedc59b78e7b9104840f94fc1db64856ea1a6376f01459cb2b48c20d9289bd477abad6aa09827f723770925812f126ee2bb80bc1bf04609cd