Analysis
-
max time kernel
149s -
max time network
154s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-11-2024 03:49
Behavioral task
behavioral1
Sample
e23f0cc174648fc57ab64d6f63f63c5a77c3307798cc3aeadba5ef1753bd3815.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e23f0cc174648fc57ab64d6f63f63c5a77c3307798cc3aeadba5ef1753bd3815.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
e23f0cc174648fc57ab64d6f63f63c5a77c3307798cc3aeadba5ef1753bd3815.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
e23f0cc174648fc57ab64d6f63f63c5a77c3307798cc3aeadba5ef1753bd3815.apk
-
Size
3.7MB
-
MD5
cf5d143826ef6d50a184c6e5d06349c4
-
SHA1
5467de524cc720f6144586c1ce93776fa8306aac
-
SHA256
e23f0cc174648fc57ab64d6f63f63c5a77c3307798cc3aeadba5ef1753bd3815
-
SHA512
a8f030729f8436d47bda2eb1609714b3a3ec6f6906cf65624743899a072ee7e9eb094146796e57940cea5fbd4752181144fabbeaecb855279b2a460ea4e199a2
-
SSDEEP
98304:VE00uJ+xP+p4uyn0P0y8DRIoXnRmmzvzBtT+0tMK2:y006P2nKJ8NI6zrle
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
rick.ima.promptdescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId rick.ima.prompt Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText rick.ima.prompt Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId rick.ima.prompt -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
rick.ima.promptdescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener rick.ima.prompt -
Acquires the wake lock 1 IoCs
Processes:
rick.ima.promptdescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock rick.ima.prompt -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
rick.ima.promptdescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground rick.ima.prompt -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
rick.ima.promptdescription ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo rick.ima.prompt -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
rick.ima.promptdescription ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS rick.ima.prompt -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
rick.ima.promptdescription ioc Process Framework service call android.app.job.IJobScheduler.schedule rick.ima.prompt -
Checks CPU information 2 TTPs 1 IoCs
Processes:
rick.ima.promptdescription ioc Process File opened for read /proc/cpuinfo rick.ima.prompt -
Checks memory information 2 TTPs 1 IoCs
Processes:
rick.ima.promptdescription ioc Process File opened for read /proc/meminfo rick.ima.prompt
Processes
-
rick.ima.prompt1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4469
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD5c8843b471f19b5172f3d61a6e8b32c36
SHA12e0ee2c1bb3fe185af937a403da4a9461da67553
SHA256bca978219f9a6eff4a9f8f230e512d9d84ac0f3b95fee30ba13227283c812669
SHA512519ac688879a48b38a910308878e7e955bf901fbf0a075a0318e9f8f71e8349949027425630078e3c8b085001caec6ec0f45485db4b0801edd2fe7591e079c82
-
Filesize
37B
MD5018b3d77f1d2e610b73da67b99b2e8ac
SHA161a86e311d7112cf80b019b3c7eae7e609147354
SHA256aaed5282ca8510aa2917d7854cd3f3df6c8810729d7e9ea074ca1fff3d896805
SHA51215dbc60b472d44ca00a64abf65339e25e3f68b62fc4c8a3b6286c648ac6ffcd9e454484a3e06bd013a04e91b5ab3e6b586a5fa8077e46570a4eda15553faa347
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
288B
MD585dffeb70b4b79c1b771c9a2977146bb
SHA198e01d4fde2f2c88c017a69d83f71d7351b57fa2
SHA256224f9cf30ec62cdfbb2572a272d285d7ebcbeec209e5996b3987998703913a21
SHA5124c50b680028a3b00133653a57a5b48cb4a338635ee264f98591c29e40811c8bf6b8a756fd220b301ed0487203d6157e9edef5766614b783a3ddcf2edbdf7b9f8