Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    07-11-2024 22:09

General

  • Target

    33a4dbed4193258ceff902066173d0978728a472421cc498cd1457f1a55fbf4c.apk

  • Size

    561KB

  • MD5

    48b8a56f95f33b70dbe9b6022878a636

  • SHA1

    629e842f2cca0220e241c1fa821b0972bad91f8e

  • SHA256

    33a4dbed4193258ceff902066173d0978728a472421cc498cd1457f1a55fbf4c

  • SHA512

    a9fce39ef39f2f1d59876238fd1c56f90b5e83d500600708723cd051927ecd41f51fd2075ffd2ace6364fd300b55f9260bc1150c73a25cdaa2c1760f7b2db6e0

  • SSDEEP

    12288:GDoUzhQxsnVCUCwz0hSQ3tx2ZUezdQtk0U081r5CpKtKcnV:GDoUzhQxk0zw4SktCvz4O1lsKtKcnV

Malware Config

Extracted

Family

octo

C2

https://hepsinezipala4esdim52.com/YzM1YThkNDFkNmQ0/

https://hersenbo67saaaeldai548.com/YzM1YThkNDFkNmQ0/

https://alayinag45idaesaesr5454.com/YzM1YThkNDFkNmQ0/

https://neadamsin45mdeaayaq.com/YzM1YThkNDFkNmQ0/

https://hepsi010malltim21.com/YzM1YThkNDFkNmQ0/

rc4.plain

Extracted

Family

octo

C2

https://hepsinezipala4esdim52.com/YzM1YThkNDFkNmQ0/

https://hersenbo67saaaeldai548.com/YzM1YThkNDFkNmQ0/

https://alayinag45idaesaesr5454.com/YzM1YThkNDFkNmQ0/

https://neadamsin45mdeaayaq.com/YzM1YThkNDFkNmQ0/

https://hepsi010malltim21.com/YzM1YThkNDFkNmQ0/

AES_key

Signatures

Processes

  • com.ideainterest38
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4329

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ideainterest38/cache/ngdntaoren

    Filesize

    450KB

    MD5

    3cb09be6b0217183f2f6cf88b4de6661

    SHA1

    939e10c4ea534cca3d85f8db93998b1a9d7b8740

    SHA256

    401dcb5ea9b84370fd3a3fc211fe1974c8cfc67a16c70a7a0a67aafccd7c584a

    SHA512

    258259d57355ac85fb18b8f5f3a924fccc6a03055bfc496b26b23f242c7e01b283fb77ded9155a1c21c8f0c04a297312efc0dae728fe409de12825923cff5f98

  • /data/data/com.ideainterest38/cache/oat/ngdntaoren.cur.prof

    Filesize

    525B

    MD5

    26523bc12c282bab6f3c9bae4547734f

    SHA1

    4085838d515f701b499a9d4fa4e7a8ab04ea1bd1

    SHA256

    b8fdc93c8920ec84fa957ce1a6ad6d56043b19d66d125ddac43db313d3b50eca

    SHA512

    b69607a4e82e7e431f0eb2c831800f5a18255b91a6bf4f4aa81e4eef79ef32eba57761849003ad9e156fca981dbe8b16d20b040d939a82c59be0f803516a61ed