Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
02-12-2024 10:07
Behavioral task
behavioral1
Sample
PSBGUARD.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
PSBGUARD.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
PSBGUARD.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
PSBGUARD.apk
-
Size
8.7MB
-
MD5
35bb1b032bcf32798e9f0c60ec29a409
-
SHA1
2022ad9ca1be7fbabf405d484379bbae1613758d
-
SHA256
d9b6a66bf24972c84c51094df4ee517796f29993c0d9d50e093b5e1d946bce79
-
SHA512
4abcc715501ff990924396e7ea67c890be6aef2cee4b08113af49331b44c6458e8cd352f9d02cd5e922e5fa1e9a7c86167ac7cfd36d49f76de8671cc115256e3
-
SSDEEP
49152:TTkjtKPmcYH5pvB8KaaS+LZcPxmzBzdGG6QTOf3U9Yqu0cgxAMdIikzu4:TTcK6p8rarZoxmzBzBVTI0txAHu4
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId collect.readily.greensboro Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText collect.readily.greensboro Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId collect.readily.greensboro -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener collect.readily.greensboro -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock collect.readily.greensboro -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 25 8.tcp.eu.ngrok.io 99 8.tcp.eu.ngrok.io 156 8.tcp.eu.ngrok.io -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground collect.readily.greensboro -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo collect.readily.greensboro -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS collect.readily.greensboro -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule collect.readily.greensboro -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo collect.readily.greensboro -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo collect.readily.greensboro
Processes
-
collect.readily.greensboro1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4491
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD58bb067a9fdbd93a700a12fb82f197383
SHA192d426e1f282fc81bf8f87d28ef5fcb71320a908
SHA25683463dd4e2c25196ef1ca1641175a2bc0b5e077450f74850db9a9f6e63a136d7
SHA5129b4028b44d7a5a3d57611b61130cd449c3909fe68902ce854e3be7330e5b4a11e8295d65ea45488c4d6efd023e7df30f32004864844b26b31db6f9221b8a4fb6
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
276B
MD5a454e10005741fd856743608d22d47f5
SHA196b36bb1efe67ee81aaf5caab14914823b4535bb
SHA2567bdb2aa660fc52cf00c88a4d471990a09c1495e83089798a40a9446ad0a4feba
SHA5121542101e1712d0d63b71e77f4134dd08a915d9125d0c780f0a689456f10dad17ba57a91579cdea2da9e3a4e1bf5da415e460a66ec06fd2ebe3573d23640c2f94
-
Filesize
57B
MD5fb727292bcc77f45a390244715095798
SHA132edab9d0ac247d666e1f8f1339cdc4a24629f01
SHA256c6251efa3b043878e01398ce68491edc3c00202e5011d0567c55de0d5a6233d7
SHA512c0ad73c1641d58f301c6726aa9c6f18eece50f299997b1699ee93512559a891ced350608932a34c7319f57a98e06acb3b9354f725573922357cb9a590483dce9