Analysis
-
max time kernel
137s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
18-11-2024 15:06
Behavioral task
behavioral1
Sample
appbnl.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
appbnl.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
appbnl.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
appbnl.apk
-
Size
4.5MB
-
MD5
e3206520c98f993d5a3096fa88fe5ebb
-
SHA1
87a521d5f62610d2f87b733e72f7d646ee8980cb
-
SHA256
9f693923e5641c046bdcadf10b4e2b553d078b98afc2e30f2d72660b1e0161ed
-
SHA512
49fd1d3ce6dbca6728b8c3169be53522259b1642067130964fa33d613602466d4ba323a002aea8935e84a08d6298981243803a5e750217ed169cd6334e643fcc
-
SSDEEP
98304:yr0OhinKhin6ShinphinxuhinFhinrhinPhin7+JgBK7GDabqcqNjVl:1gCMC6kCHCxACTCFCZC7+JgwCDa2dNjH
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bnlappnuovatoken.apptoken Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bnlappnuovatoken.apptoken -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.bnlappnuovatoken.apptoken -
Acquires the wake lock 1 IoCs
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bnlappnuovatoken.apptoken -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bnlappnuovatoken.apptoken -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.bnlappnuovatoken.apptokenioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bnlappnuovatoken.apptoken android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bnlappnuovatoken.apptoken android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bnlappnuovatoken.apptoken android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bnlappnuovatoken.apptoken android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bnlappnuovatoken.apptoken android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bnlappnuovatoken.apptoken android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bnlappnuovatoken.apptoken -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bnlappnuovatoken.apptoken -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process Framework service call android.app.IActivityManager.registerReceiver com.bnlappnuovatoken.apptoken -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process File opened for read /proc/cpuinfo com.bnlappnuovatoken.apptoken -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.bnlappnuovatoken.apptokendescription ioc Process File opened for read /proc/meminfo com.bnlappnuovatoken.apptoken
Processes
-
com.bnlappnuovatoken.apptoken1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4940
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD50f846d61a922fcd3852c7241f99dc9bc
SHA12198433f3a500dcf88048096d0dbdb9f26b7ce47
SHA25639ced8a590d3e71780b7d787db9b98065d9cd7a9f987dda085fb837a012cff8d
SHA512d2380af9ad7c68ffdca1745f6dc3f747cc5ff5622ad1c6a1b1af79267c8d3d1f28fe6e01c435797a77309ec31ce085a3c6866503b01bc9850f679ffb34ea3c08
-
Filesize
121KB
MD57b38720a0352dffa26411726c72dd2b0
SHA1b15e687f42abcdc12427f146a3115ef2259211f8
SHA2562013f490d45638cada331b3474ed65b9a43cec60da773accc98332e58c06336d
SHA5120df28f87da4f9beb3ca8c108f54021a2a1a1434771abbb5ba67a2736097f2287b05e5220a33e92c42ee13ecae1144714a422b986763712794f69e65bc44c83e3
-
Filesize
11B
MD51b65c10c6215685f9d621d797f911373
SHA1cc50aaed5cd521a62ec8cf9fe0413153ec90f265
SHA2562230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89
SHA5125a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f