Analysis
-
max time kernel
148s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06/11/2024, 02:49
Behavioral task
behavioral1
Sample
6b510337bcd1f004ea05de9d848bd8316d2f2c3c6fcba6e84bc31d87fd1e36aa.apk
Resource
android-x86-arm-20240624-en
General
-
Target
6b510337bcd1f004ea05de9d848bd8316d2f2c3c6fcba6e84bc31d87fd1e36aa.apk
-
Size
13.2MB
-
MD5
97ffda88c14091b87669cb41f2716d47
-
SHA1
c078d574b72f30a229aa34b13b22443b87c8cb20
-
SHA256
6b510337bcd1f004ea05de9d848bd8316d2f2c3c6fcba6e84bc31d87fd1e36aa
-
SHA512
942528f0ae6c123f758f83a267936073901dbe1c2ff03cdf2edde5fd6a7d55686593088531121afdeb6fba07bf8e43f80ac9ce92512917ea49df5768e5f0b8ea
-
SSDEEP
393216:+AiHDxXIQekExHQ7ZqVWRRdsnjuasOgS0:WebxHQ7ZwWndsnjuasOd0
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mmt.myao -
Queries account information for other applications stored on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.mmt.myao:s1 Framework service call android.accounts.IAccountManager.getAccountsAsUser com.mmt.myao Framework service call android.accounts.IAccountManager.getAccountsAsUser com.mmt.myao:main -
Queries information about running processes on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mmt.myao Framework service call android.app.IActivityManager.getRunningAppProcesses com.mmt.myao:main Framework service call android.app.IActivityManager.getRunningAppProcesses com.mmt.myao:s1 -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mmt.myao -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mmt.myao -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.mmt.myao -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mmt.myao -
Schedules tasks to execute at a specified time 1 TTPs 2 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mmt.myao:main Framework service call android.app.job.IJobScheduler.schedule com.mmt.myao -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 3 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mmt.myao:main Framework API call javax.crypto.Cipher.doFinal com.mmt.myao:s1 Framework API call javax.crypto.Cipher.doFinal com.mmt.myao
Processes
-
com.mmt.myao1⤵
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4362 -
getprop ro.build.display.id2⤵PID:4786
-
-
getprop ro.build.display.id2⤵PID:4869
-
-
getprop ro.build.display.id2⤵PID:4901
-
-
getprop ro.build.display.id2⤵PID:4936
-
-
getprop ro.build.display.id2⤵PID:4959
-
-
getprop ro.build.display.id2⤵PID:4995
-
-
getprop ro.build.display.id2⤵PID:5070
-
-
getprop ro.build.display.id2⤵PID:5121
-
-
getprop ro.build.display.id2⤵PID:5175
-
-
getprop ro.build.display.id2⤵PID:5206
-
-
getprop ro.build.display.id2⤵PID:5228
-
-
getprop ro.build.display.id2⤵PID:5265
-
-
getprop ro.build.display.id2⤵PID:5293
-
-
getprop ro.build.display.id2⤵PID:5325
-
-
getprop ro.build.display.id2⤵PID:5366
-
-
getprop ro.build.display.id2⤵PID:5393
-
-
getprop ro.build.display.id2⤵PID:5415
-
-
getprop ro.build.display.id2⤵PID:5452
-
-
getprop ro.build.display.id2⤵PID:5484
-
-
getprop ro.build.display.id2⤵PID:5502
-
-
getprop ro.build.display.id2⤵PID:5541
-
-
getprop ro.build.display.id2⤵PID:5567
-
-
getprop ro.build.display.id2⤵PID:5588
-
-
getprop ro.build.display.id2⤵PID:5627
-
-
getprop ro.build.display.id2⤵PID:5658
-
-
getprop ro.build.display.id2⤵PID:5677
-
-
getprop ro.build.display.id2⤵PID:5744
-
-
com.mmt.myao:main1⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4616
-
com.mmt.myao:s11⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Uses Crypto APIs (Might try to encrypt user data)
PID:4632
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD514ed3b3b1992b900dd2f00ba698522d1
SHA1cedaed104cb331c658da1e4621b3eb8124c6111d
SHA2565645ec786801967563e4599a58f7897a0e08edea8a14f2a8bbe769fd15439359
SHA5122d5e372893a036fe924331e597332abbd29b617388537fab66cf0a8a7a212f19518399e2e8c2728a5ad06171ad8979ba4e13f456d5d0ae0ba654c4f5092e95c2
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
410KB
MD58a5b60f05a08e543fe01f935f2c9e29f
SHA1ca48cea2aedfbae01b3f4cc230e860f8db1564e3
SHA2562c666aa49eca9532d43c228ad1618012f895b9ba9479adfe0426be92a60e2d2b
SHA51279c267b50a0b533b905c83c0cd58fb8686404b586d190078e34b85cbd38a86ba9757b026d9314bc221cf6e8c8e71757f7ef9d45a895b153c895f24b7101f8bf5