Analysis
-
max time kernel
149s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
02-12-2024 10:34
Behavioral task
behavioral1
Sample
PSBGUARD.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
PSBGUARD.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
PSBGUARD.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
PSBGUARD.apk
-
Size
8.7MB
-
MD5
35bb1b032bcf32798e9f0c60ec29a409
-
SHA1
2022ad9ca1be7fbabf405d484379bbae1613758d
-
SHA256
d9b6a66bf24972c84c51094df4ee517796f29993c0d9d50e093b5e1d946bce79
-
SHA512
4abcc715501ff990924396e7ea67c890be6aef2cee4b08113af49331b44c6458e8cd352f9d02cd5e922e5fa1e9a7c86167ac7cfd36d49f76de8671cc115256e3
-
SSDEEP
49152:TTkjtKPmcYH5pvB8KaaS+LZcPxmzBzdGG6QTOf3U9Yqu0cgxAMdIikzu4:TTcK6p8rarZoxmzBzBVTI0txAHu4
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId collect.readily.greensboro Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText collect.readily.greensboro Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId collect.readily.greensboro -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener collect.readily.greensboro -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock collect.readily.greensboro -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 81 8.tcp.eu.ngrok.io 140 8.tcp.eu.ngrok.io 6 8.tcp.eu.ngrok.io -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground collect.readily.greensboro -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction collect.readily.greensboro -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo collect.readily.greensboro -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone collect.readily.greensboro -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver collect.readily.greensboro -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule collect.readily.greensboro -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo collect.readily.greensboro -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo collect.readily.greensboro
Processes
-
collect.readily.greensboro1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4964
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25B
MD5dad98e6095049e89801a10085d911a26
SHA169779eaeec6cbe7316650456b54fd626c3759047
SHA256c5272e3c7b2ae8ccf010f2e4fcfc00767730dba6766a189355f365df10756202
SHA512312600f5594a5fd2268e8c5c4cc5a2faaf9b77b8eda0bc9762ff7d29693274467278b6afec9774460fcd041778fded217d8c88025aa4c236a31989ffc5bf7f8d
-
Filesize
25B
MD58bb067a9fdbd93a700a12fb82f197383
SHA192d426e1f282fc81bf8f87d28ef5fcb71320a908
SHA25683463dd4e2c25196ef1ca1641175a2bc0b5e077450f74850db9a9f6e63a136d7
SHA5129b4028b44d7a5a3d57611b61130cd449c3909fe68902ce854e3be7330e5b4a11e8295d65ea45488c4d6efd023e7df30f32004864844b26b31db6f9221b8a4fb6
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
276B
MD53f62f6bdf126100d32f400ed6ac05c9b
SHA1a366fa11c677340281d31180da337cad711838e0
SHA256f7b7fb50e3e84847688c69a69f9684cfc702b8a261467209f4eac447d0a099ba
SHA512b1264d06adf1af0e8393ee1f989916fad733227e8fc015108a13366433d5eb4bab5268c72c650499a2f8ab28277bacf6079978dad442020f8322865e8b8fc66f