Analysis
-
max time kernel
136s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
16/12/2024, 22:00
Behavioral task
behavioral1
Sample
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
-
Size
1.4MB
-
MD5
520c1eb7583328ee55fbad2f63ed732d
-
SHA1
3978f8e6aff6d79bef675d5eb2930291fd149a26
-
SHA256
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c
-
SHA512
3e3590db6831c6e44d34c80066cd1493cd06fa144ff3435e3d8fbb97c617c454ce331b069a59ae15aefba2af10b33a6c101ffea926a2c4091db6c353b6c8c435
-
SSDEEP
24576:aAcXBxI3xiR2qpNJCmWYuyjmzOW2Tr/fQ5j+0PQ8Eh9E7A2Fk:abxI3kR2I+YLmyzr/KPQ8EsXFk
Malware Config
Signatures
-
pid Process 4345 jeg.cwnnp.kuuxh -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId jeg.cwnnp.kuuxh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId jeg.cwnnp.kuuxh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText jeg.cwnnp.kuuxh -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock jeg.cwnnp.kuuxh -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS jeg.cwnnp.kuuxh -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS jeg.cwnnp.kuuxh -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener jeg.cwnnp.kuuxh -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver jeg.cwnnp.kuuxh
Processes
-
jeg.cwnnp.kuuxh1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4345
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5e98dccdba67ad88a0746d93b5e36d247
SHA1f17609529d67d1cd57a8ca690c420bac27384081
SHA256c7408a3408f0887b1b22ff67ee41e31fc8e6271cfef52b86b7330629b2762c52
SHA51264287d481bbf833a73a2eb87994c2b670f9e95203df23cf844d5e644a77386fc5cd03b2b43fb6e2fd0a924c3fc45b4274a3725a5ad81f0b1f287d6722f05beaa
-
Filesize
5KB
MD5166bd79a125dc73d2a7c463c403bdecc
SHA12d33a06a4f02510cb401e90224ea4a6557599a49
SHA256792dbffaaaf70493b556772f5453568b93d9da60c4bba092d63aca81e8f330e3
SHA51239956bb45f82c32be940d8cfa9acb31ff530f9fe9cb2a940d8ceb68d5c275b5cad6753894dfca8f5d33f89971ca2832bef4cec973cf6dcf2baa1cd6f3c818dc6