Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    10-11-2024 14:24

General

  • Target

    com.baniiz.kedra.apk

  • Size

    8.1MB

  • MD5

    768c88c562e1c1c470811022f63084a6

  • SHA1

    5899f34d5b3410215156a395f3431054a62d5821

  • SHA256

    462c44e0dbd9b95cf3d33e284b72be2dbec175a174a5985b882d88614de50ad7

  • SHA512

    eb90abb038bfa330716f059829b89512e0f66a0a5400cd22e110e44df8f09949f72875f5ffe4e8e79b3b94dfff7a6db2c6328f05a958ab0cca18ab726dbc32a0

  • SSDEEP

    196608:Rl7z27o8h4otkBA4x2g8dxzhaLE++DGDeDgRi:Rlu084o4x2g8vIn+6y8I

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • build.ledear.lycds
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Schedules tasks to execute at a specified time
    PID:4358

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2024-11-10.txt

    Filesize

    13B

    MD5

    de2c41a51ee9246eb1708f65b511add0

    SHA1

    2f442d634c8a18760a232c8829d4b5d74a52f074

    SHA256

    ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab

    SHA512

    7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a

  • /storage/emulated/0/Config/sys/apps/log/log-2024-11-10.txt

    Filesize

    33B

    MD5

    4a6d8d7e309a7e0e57c43858d5808666

    SHA1

    bcfefe9407b9b1464b3fdc5c2daf4d28006e31e8

    SHA256

    1d3b3b700fb12533276cb469bd75ec44f6a5b6f6eb238824a8151e9286931460

    SHA512

    65d414fc07d6b46a03c0dc2d513189a4ab29f87517086068eae5ca45dde0b4d61453edb89f2c123dd579945f0294451dc0d74d2a66652ee424e54356480faeb7