General
-
Target
10b62488b702d01ac4d68634587190957ae7608fe4cf0d84fd6f6ff59140f61d.bin
-
Size
3.7MB
-
Sample
241204-1yzg7atlfs
-
MD5
a57a4c26ea461d19da757ec3b285fe47
-
SHA1
1fd8e8426b8554673a0f881c47064e567cf50492
-
SHA256
10b62488b702d01ac4d68634587190957ae7608fe4cf0d84fd6f6ff59140f61d
-
SHA512
83460bfffc95307246dc08b563f318c58e873382f4ffefbd5face7fafd9d36a42a92d6e6e7698b075962da85daf910fe071b8594667c7a5a4a66da75af89d939
-
SSDEEP
98304:Id/ZEPXblGUyLk1wMUBn7ImPwD4HxhTswglzwHvEVtFLC:OEJnwMUpIGwD4R+w2zqvEVjLC
Static task
static1
Behavioral task
behavioral1
Sample
10b62488b702d01ac4d68634587190957ae7608fe4cf0d84fd6f6ff59140f61d.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
10b62488b702d01ac4d68634587190957ae7608fe4cf0d84fd6f6ff59140f61d.bin
-
Size
3.7MB
-
MD5
a57a4c26ea461d19da757ec3b285fe47
-
SHA1
1fd8e8426b8554673a0f881c47064e567cf50492
-
SHA256
10b62488b702d01ac4d68634587190957ae7608fe4cf0d84fd6f6ff59140f61d
-
SHA512
83460bfffc95307246dc08b563f318c58e873382f4ffefbd5face7fafd9d36a42a92d6e6e7698b075962da85daf910fe071b8594667c7a5a4a66da75af89d939
-
SSDEEP
98304:Id/ZEPXblGUyLk1wMUBn7ImPwD4HxhTswglzwHvEVtFLC:OEJnwMUpIGwD4R+w2zqvEVjLC
-
Vultur family
-
Vultur payload
-
Checks if the Android device is rooted.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
1System Network Connections Discovery
1