Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    14-12-2024 22:00

General

  • Target

    069af79eb0a6deee536507d53f91a75383b682b6acb009cc0b59cf6f61e98bed.apk

  • Size

    1.2MB

  • MD5

    14e148baf64635d2160adb7278863978

  • SHA1

    0b4e17fe17e16b09e6917350a91ce9e13c8874ca

  • SHA256

    069af79eb0a6deee536507d53f91a75383b682b6acb009cc0b59cf6f61e98bed

  • SHA512

    291a47e2793ae5e0838718303bc5949401aa6933c0f6d44830731ab6741108dc0c2a26b4298af46e1a1c1b18c73b9b3c888231abcc7c548c04ad037ad5c8b4e8

  • SSDEEP

    24576:+OotVjLfw9/6Qe5Dy83peNWzZTOPCkkOFMpBD0GJnZ5PTlYN0OY:+H/ws/5b5eoNTkFMfpJ7hz

Malware Config

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

rc4.plain

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

AES_key

Signatures

Processes

  • com.forcetravellcb
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4241

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.forcetravellcb/cache/oat/xoahknz.cur.prof

    Filesize

    508B

    MD5

    6ad96442c2e8823862740a9f7d0ec9bc

    SHA1

    66fb2193d0e8567663fa883d387bd377961be964

    SHA256

    832b654d6bea32974d1979c93e1e64f90ef108b34f169854f9e64f5953414e92

    SHA512

    ad60b7cd474b0e8e37faa67c786192293345a8f72b993dc99578797c241ced2a97b2758b5ca88ca7f93804fabcb9b9025f3bb868b215ca6b0e0d03cee311a88e

  • /data/data/com.forcetravellcb/cache/xoahknz

    Filesize

    449KB

    MD5

    d71cf101dce9e5138947882e29c6e2df

    SHA1

    a805fee8879fb93ab33ba3ba69b5ef22863edc1a

    SHA256

    0949f4d4c26ca188d89230fbe238593673125d7adf99ff94b5139bf4944ce5b7

    SHA512

    8ea2d4396f7a3a8028292bd0b5ba0bdb61bc074c84e2fd011e04b7175e35ea08558e06afcd34036247e24ca333c7bccc9a8c4b3a7ad0b58bec1bc1ee5de0a092