General
-
Target
9e567a34934a60cb8874bf1e525fe00b.bin
-
Size
3.5MB
-
Sample
241107-b3ek5sseqg
-
MD5
8b96b5d3f80f2304dbd6e6f067aed588
-
SHA1
a5093f076fcbec961af0ba9b641cf2e9d5d9efd0
-
SHA256
faaded24862023771812a156faca34da625f54ef1ed60250e67814f928ed8116
-
SHA512
3bcd79e3e003ebe683a6024d6c7d83e74cd403aa1a0a05ad6137ae3a01b93b3a44a2c75023c6277434bfafdbb165c265cdace6265dac2aba4c7de70ef0043707
-
SSDEEP
98304:vGO8+nBUo75FKfZUTwVE1yYrMDAtT39ThA7964+mG:1hK+ToExYD0OP+n
Behavioral task
behavioral1
Sample
c7f1c45041e15266f830cbce16173b8215391162e18bbab0b07e336b1511f3f5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c7f1c45041e15266f830cbce16173b8215391162e18bbab0b07e336b1511f3f5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c7f1c45041e15266f830cbce16173b8215391162e18bbab0b07e336b1511f3f5.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
c7f1c45041e15266f830cbce16173b8215391162e18bbab0b07e336b1511f3f5.zip
-
Size
4.4MB
-
MD5
9e567a34934a60cb8874bf1e525fe00b
-
SHA1
d5f11cf62bed2ac2c4b9e60cad7c8011cb886a24
-
SHA256
c7f1c45041e15266f830cbce16173b8215391162e18bbab0b07e336b1511f3f5
-
SHA512
ef8f2f7fba2b6a6ca30de65ab7506d94902be8bcb56262a802289c05e698102dcf2e71629744b1a2f43cb21c024769d2f691fa0e8c3cb279834f02decfc202a6
-
SSDEEP
98304:WazBMT4mzE0V0tDVsQWtQ5xxUnoPlSq+hrOB1Mtgk:4HzERhlXxxOoPlN+hrA1Mtgk
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1