Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    06-11-2024 03:41

General

  • Target

    d021bc1ec9819f8223e21c591acb4ff15c32751fb34ae2bdc4f813d13bf87ee4.apk

  • Size

    9.4MB

  • MD5

    03d74cf6adff84199aadc3c6196f8cd1

  • SHA1

    c3ea92435c99118c354a4898191987b2b04e7577

  • SHA256

    d021bc1ec9819f8223e21c591acb4ff15c32751fb34ae2bdc4f813d13bf87ee4

  • SHA512

    7c39016fadb0c8cc492ea18c42ae92a7a61af2b7b6a4597bca0f3d9f2e9a266bb9ce7f9a2e5163dfeae73c56049da70c1cd8615998e029673f8bd9cfe0c13f8c

  • SSDEEP

    98304:ENo+NRZyyzrnqyQd4RsDO7LAYRHemzZzB9TO0txGeW/j:Eag1zr44iDWLAKH5zZ1cj

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Acquires the wake lock 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • extraordinary.metal.refer
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Schedules tasks to execute at a specified time
    PID:4515

Network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2024-11-06.txt

    Filesize

    13B

    MD5

    de2c41a51ee9246eb1708f65b511add0

    SHA1

    2f442d634c8a18760a232c8829d4b5d74a52f074

    SHA256

    ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab

    SHA512

    7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a

  • /storage/emulated/0/Config/sys/apps/log/log-2024-11-06.txt

    Filesize

    41B

    MD5

    aa2ee7a3f07c5324ffdca3405dd2e249

    SHA1

    2d48b3472fca60ca317e1c86afb24258f5e1cff1

    SHA256

    dc40d46d3ecb21c4677f97448672bf03883640f9387ab71183aa4f9aeaea3583

    SHA512

    9c3f4a4fe078eaf1388afa5732b721fa7dd6c0645312f9cbcd3001496094aa392bf34e8d3071b595f1583beae3928847c9f47896d92287327e558e9e6e1e5287

  • /storage/emulated/0/Config/sys/apps/log/log-2024-11-06.txt

    Filesize

    37B

    MD5

    64b095dd5ac881ec56b77fb9d2893c0b

    SHA1

    60a049b02a1a761191ddbbf4321fa678fccedb57

    SHA256

    697c9cffdaf7cf5c92e06ff22ce930ab8ad2a00ff974561f26dcd54f1952ec6e

    SHA512

    33919c7c35d89e1eedc59b78e7b9104840f94fc1db64856ea1a6376f01459cb2b48c20d9289bd477abad6aa09827f723770925812f126ee2bb80bc1bf04609cd