Analysis
-
max time kernel
149s -
max time network
148s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
07-11-2024 01:52
Behavioral task
behavioral1
Sample
ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687.apk
-
Size
680KB
-
MD5
ca55f28d7f288ffc4e3805ac91ab2a30
-
SHA1
dab80264250e4046a21709c09c3038302dbdb593
-
SHA256
ac29f87ad5fd5d3da35e8c4516cae207c81656c024bad3466c7c9c6f1b619687
-
SHA512
6418ce1b48d70f587b14ade3882b2150bf9b5b5c83f352620e0a879f7375d50b23ac0ecbf8c514e99ae17cc029259f6c67e1dca373490740bdb9d047deecf7b1
-
SSDEEP
12288:lwlbo9GgLRBWItYYyow7HCgI4xoQBjj1dFvFIt1+QvZI46Rq21tg+75vV:lwlfglBWItYYjwjCgI4C+jpStUD4GNOm
Malware Config
Signatures
-
pid Process 4223 karenn1.expiration.picked -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId karenn1.expiration.picked Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText karenn1.expiration.picked Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId karenn1.expiration.picked -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock karenn1.expiration.picked -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground karenn1.expiration.picked -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone karenn1.expiration.picked -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS karenn1.expiration.picked -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver karenn1.expiration.picked -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule karenn1.expiration.picked -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo karenn1.expiration.picked -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo karenn1.expiration.picked
Processes
-
karenn1.expiration.picked1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4223
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD5a9256f55737b655c8cff95418411997c
SHA1d81a4e85ecef3a4f08d50da9c75c49a3c64ffe24
SHA256bad705c44807d12463fb587087c4e9eb24769d82981229ac8b74abc9b1a44412
SHA51210d10a6498973ed65d47c74ba6d8831dad94213a5071353dc445de46e021689284fbbf4accf5ba1f97a0675a7652ec069ac70f38d63ba36b8595a8caf8d37574
-
Filesize
24B
MD5a5deddadf73ad4d93368a9cd0d48587f
SHA1196520dc66223cca873ebb7c3d38ea022a22aa9e
SHA256750b96971b257f8a3287b1e10a527f4caf6dd772afe71871f4ebde16a765244b
SHA5127bb14cc58be581962403b81d83060950c0424b389c027a7d2f8a46756108300ab5efc5ec4e1639e886edd604395fe0553c7958b2e29b7c129ffc5ae1a9cb37b6
-
Filesize
275B
MD52b13d1ec76fc7181492778c74831eeeb
SHA1ca796bf5ae5bc896e7a2e3921c916e7495baa094
SHA256302844a0d699db1ec1c3d03f4c14e1d48fcf6d5e3b38bd1cddd982eee9583a95
SHA512bc6be0a9ae5b30f8b2ae0efdce98f9548612862a55665a23ac4f29132d0571a20f351c6f05e1b87178fd5e413170d88eef24ca221f2eead8fc66a404817558ce