Analysis
-
max time kernel
12s -
max time network
305s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
25-11-2024 22:19
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
ready.apk
-
Size
684KB
-
MD5
6e2e4c52ca8deaed5509dd249a930d37
-
SHA1
d18a1618729576e8422f7de601d381bbe2513503
-
SHA256
1de8041113af1f186b8da5f4c6f35073b717fda160c23050cea7d0d138492b6d
-
SHA512
7828719e1f66656be40878331b6ea192246d6512d7efa729a487110ca404c42cd5f71ea2de038709131ae82f1ac44ef21d03569799fada1a90465e739a80613e
-
SSDEEP
12288:/X7K04GzY/KCgaF6SFjHo/GUCuju5FrXsjPusT3cgtN0FBmj6Rq21TgvstWD//0://zY/KCtF6SF7o3XSXrXsjPHT3SFBmjS
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.app.app -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.app.app -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.app.app -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.app.app -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.app.app
Processes
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1