Analysis
-
max time kernel
46s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
22-11-2024 13:44
Behavioral task
behavioral1
Sample
15f59da4589a0b9fc3b9d4c0f261fe50.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
15f59da4589a0b9fc3b9d4c0f261fe50.apk
Resource
android-x64-20240624-en
General
-
Target
15f59da4589a0b9fc3b9d4c0f261fe50.apk
-
Size
3.5MB
-
MD5
15f59da4589a0b9fc3b9d4c0f261fe50
-
SHA1
a819d8132a20e6f6b375d4c2c813776d7692ea48
-
SHA256
0b76e0e7ed26277903223f3b0868cf303f8a6b5c05c045eb94a6d6ca3e9a4f89
-
SHA512
b843e5153d38e210be5fe4cbd54d7d28b260cb4f655790090731f479b2a74c0c1bb80d32963b3c867730b40c6eeda9900cdc8649ff7091dd6e104ba7c97367a4
-
SSDEEP
49152:2gWAVs7LxUOmZt3svb3Y5tWWqbFg+BgKDhEVe14mMcCnJMzvvD9jz0o/Vz:l67Lxm+b38tWtbF9pBaPcrLxjQa
Malware Config
Signatures
-
Checks known Qemu pipes. 1 TTPs 16 IoCs
Checks for known pipes used by the Android emulator to communicate with the host.
ioc Process /dev/socket/qemud com.example.mysoul /dev/qemu_pipe com.example.mysoul /dev/socket/qemud com.example.mysoul /dev/qemu_pipe com.example.mysoul /dev/socket/qemud com.example.mysoul /dev/socket/qemud com.example.mysoul /dev/qemu_pipe com.example.mysoul /dev/socket/qemud com.example.mysoul /dev/qemu_pipe com.example.mysoul /dev/socket/qemud com.example.mysoul /dev/socket/qemud com.example.mysoul /dev/qemu_pipe com.example.mysoul /dev/qemu_pipe com.example.mysoul /dev/qemu_pipe com.example.mysoul /dev/socket/qemud com.example.mysoul /dev/qemu_pipe com.example.mysoul -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.example.mysoul Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.example.mysoul Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.example.mysoul -
Queries information about running processes on the device 1 TTPs 8 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul Framework service call android.app.IActivityManager.getRunningAppProcesses com.example.mysoul -
Acquires the wake lock 4 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.example.mysoul Framework service call android.os.IPowerManager.acquireWakeLock com.example.mysoul Framework service call android.os.IPowerManager.acquireWakeLock com.example.mysoul Framework service call android.os.IPowerManager.acquireWakeLock com.example.mysoul -
Makes use of the framework's foreground persistence service 1 TTPs 4 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.example.mysoul Framework service call android.app.IActivityManager.setServiceForeground com.example.mysoul Framework service call android.app.IActivityManager.setServiceForeground com.example.mysoul Framework service call android.app.IActivityManager.setServiceForeground com.example.mysoul -
Reads information about phone network operator. 1 TTPs
Processes
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Queries information about running processes on the device
PID:4941
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Queries information about running processes on the device
PID:5100
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
PID:5180
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Queries information about running processes on the device
PID:5243
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
PID:5295
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Queries information about running processes on the device
PID:5352
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
PID:5444
-
com.example.mysoul1⤵
- Checks known Qemu pipes.
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
PID:5501
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5232d214e1f713bbcb69ff77d99e628a5
SHA168e850e2c8469105c3d2018decf1d749a7480799
SHA256b1e906e4a4761dc8185a3b6e2cc533966a69939dc0d1cb2a57da0886ad0ef113
SHA512a89e9f9f2e42d11a14eba4f02fb78773c23788aa039aeabe165161eadf5330da468ca632fff0b1e665865bec71e03e7cadde8f6636291a1cd042ea127795cf07
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
32KB
MD52779f6c5f2db58906eb4c2f190875bd9
SHA1849d3b92d523bbd54d60dc818776f2b7f48b5ea1
SHA25665a4b92648a42732286ebe456520ef96142bc480eb451993274ee4ebb182b43d
SHA5125f8fac076e30b3d86b31e06998c576c23c131a52a2d65b048b9ba35d9895ba9665f643142fc21eed896574ffafc0e1df05b8bb014c98e8b050e35ca7c54a1b8f
-
Filesize
108KB
MD5c2489365a043b2b2faff0160176eafb9
SHA19e1299a86da01962e73cf3e2c445474627402edb
SHA25603697c2f84280881805e18eaba30f6c90d5fb8b1d416b31794ba9f16adfdd3a3
SHA5124c0098ef2bb4fd60da943d9ee7f517b7bd6c5572df3f1e18be1e3b6170863ec6575ad820da51be76a467f75c6b7e490332f0632c469dde6e0d4de1a7e7b16460