Analysis
-
max time kernel
148s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
05/12/2024, 08:37
Behavioral task
behavioral1
Sample
M-Pajak.apk
Resource
android-x86-arm-20240624-en
General
-
Target
M-Pajak.apk
-
Size
13.2MB
-
MD5
499cf9283803b7fd1b9e3e2443afd539
-
SHA1
8d14e61a474e709f2d9a811ddf6ff9b1fc801724
-
SHA256
349551666ac3ce02d34aa3262641dcdc9af5f0c1f0eae95f543de53b90b54f8e
-
SHA512
d271fb31ed0244f965e10570087806f9f8ee315e8da43149c69c6278f9237c3dc25d908afd5d1e403d50b6e40c30e3b188684d27d1d21479aec2add907bce77a
-
SSDEEP
196608:OVpN6ujPb248uFxXEuUCzafDPNpGBHUf/VhCwjZGD+Uw5/uYjvEpJV4teZOgYT:enjCKxX+7PrVVEcmu/KOgO
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sextest.test -
Queries account information for other applications stored on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test Framework service call android.accounts.IAccountManager.getAccountsAsUser com.sextest.test:main -
Queries information about running processes on the device 1 TTPs 3 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test:s1 Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test:main Framework service call android.app.IActivityManager.getRunningAppProcesses com.sextest.test -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sextest.test -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sextest.test -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.sextest.test -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sextest.test -
Schedules tasks to execute at a specified time 1 TTPs 2 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sextest.test Framework service call android.app.job.IJobScheduler.schedule com.sextest.test:main -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 3 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sextest.test Framework API call javax.crypto.Cipher.doFinal com.sextest.test:s1 Framework API call javax.crypto.Cipher.doFinal com.sextest.test:main
Processes
-
com.sextest.test1⤵
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about active data network
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4292 -
getprop ro.build.display.id2⤵PID:4694
-
-
getprop ro.build.display.id2⤵PID:4806
-
-
getprop ro.build.display.id2⤵PID:4831
-
-
getprop ro.build.display.id2⤵PID:4864
-
-
getprop ro.build.display.id2⤵PID:4886
-
-
getprop ro.build.display.id2⤵PID:4922
-
-
getprop ro.build.display.id2⤵PID:4948
-
-
getprop ro.build.display.id2⤵PID:4984
-
-
getprop ro.build.display.id2⤵PID:5033
-
-
getprop ro.build.display.id2⤵PID:5118
-
-
getprop ro.build.display.id2⤵PID:5142
-
-
getprop ro.build.display.id2⤵PID:5181
-
-
getprop ro.build.display.id2⤵PID:5209
-
-
getprop ro.build.display.id2⤵PID:5241
-
-
getprop ro.build.display.id2⤵PID:5280
-
-
getprop ro.build.display.id2⤵PID:5307
-
-
getprop ro.build.display.id2⤵PID:5329
-
-
getprop ro.build.display.id2⤵PID:5365
-
-
getprop ro.build.display.id2⤵PID:5396
-
-
getprop ro.build.display.id2⤵PID:5414
-
-
getprop ro.build.display.id2⤵PID:5454
-
-
getprop ro.build.display.id2⤵PID:5482
-
-
getprop ro.build.display.id2⤵PID:5501
-
-
getprop ro.build.display.id2⤵PID:5541
-
-
getprop ro.build.display.id2⤵PID:5568
-
-
getprop ro.build.display.id2⤵PID:5588
-
-
getprop ro.build.display.id2⤵PID:5626
-
-
getprop ro.build.display.id2⤵PID:5653
-
-
getprop ro.build.display.id2⤵PID:5672
-
-
com.sextest.test:s11⤵
- Queries information about running processes on the device
- Uses Crypto APIs (Might try to encrypt user data)
PID:4410
-
com.sextest.test:main1⤵
- Queries account information for other applications stored on the device
- Queries information about running processes on the device
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4385
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD583aef1fc3c0bca4e0d3d176c4981d87b
SHA197f5b4cc9472fc4617e05cc6a761862eaea9e391
SHA256d6c3acfb9a826cc1f53c58a21e64cc7eee8cf9a731f2d2972dac62009d0e5b1a
SHA51298857de0757548a7e025e998d1e11307e832849f63fce908185b40217529b2b79635c891dd6b81248133b2e0b163ea05d6af5f3c419a5cd9c59e940c3f72e0b8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
402KB
MD5499b8701fffa40ad0077f2cabe621458
SHA1b289be21e0ce7bf42edc87d6fed2a2a1e89262e5
SHA25685a3549aa4cba7c7eaf1fd538cc603150863e64448eda326a37481bab9eedc93
SHA512429f24fcfdbe83b4eb7c99e3b48f44deb8093db3e21e12b992cc93ed9042bd4a3b214caa6422765b2db7fedeffe299589dd80ba532fdfcc704f4bfda82cd4db3