Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    19-11-2024 09:23

General

  • Target

    NexiToken.apk

  • Size

    4.5MB

  • MD5

    7e7edf3b1f5f0f4bdc77af7a3a5e34c5

  • SHA1

    222c048d7c746a4d1d56e9fab8e30d6a87492eac

  • SHA256

    8b05684a73f44ed82c0faf424b2d41a0c7b00c2fef4d7dc232c5433739a59f6c

  • SHA512

    f7c92063e65c635e37fc21d6418a230ea3023e20a663c75345a99d76428f3e9c84f728010a52d25376484ae28f1525741e316f8be609996c26510961054f988e

  • SSDEEP

    98304:X2tqnPP3c6no//hAKQfD0eSD0yD0PD0EQD0nAcD00D0fD0uAl:iMVno/OdfDMDTDqDiDCxD9DGDLAl

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 54 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.nexipaytoken.app
    1⤵
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Checks CPU information
    • Checks memory information
    PID:4609

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.nexipaytoken.app/files/db.db

    Filesize

    44KB

    MD5

    d5d190e1180c5e6858c40a93f7526f12

    SHA1

    0d054f2e34776c8d5bcfd54d743831b9919618fe

    SHA256

    274fe3e82fc2630d99809afd6a1c64768a77ed69c04b33e0df6a292a5a042203

    SHA512

    0d58df37359d6e35f02ef95e4edcfb05fac6c3bc57d1c3e56e49fa7b6c66aef3f99b383cb14dc5a01b52bc6a0d4685f275fb30279aa26e8339a5e0b8416ba85e

  • /data/data/com.nexipaytoken.app/files/loading.gif

    Filesize

    41KB

    MD5

    34bb1610eea1e6643d8d811d7bfbd72c

    SHA1

    13231a124318b6ea3527398bc3928d12385a6f81

    SHA256

    a5531b75e566fa6a114888530c9e27fd906d87eb81ee472400edc5c3dccea34e

    SHA512

    d78aaf696db600cb7737487d35bd1d4fc26ca2d6879dfd0938e257230e04eb8b8f65d76e7ce2d0fe0c8f7669464ab86e2400b199091467d1a6ced653c6d75f57

  • /data/data/com.nexipaytoken.app/files/txtscreensize.txt

    Filesize

    11B

    MD5

    1b65c10c6215685f9d621d797f911373

    SHA1

    cc50aaed5cd521a62ec8cf9fe0413153ec90f265

    SHA256

    2230c2b2787663a054c47450ecd1718f0296853ad768b8e5d306ecb912685e89

    SHA512

    5a9139f295dbe384b1584eff5c11f3f86759232f7b661b75f27fe92b996b4cdc0552e315f79b26f5f2c1f91756d9ae04cf0c3675b6172e91a3d373b9b314496f