Analysis
-
max time kernel
136s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
16/12/2024, 22:00
Behavioral task
behavioral1
Sample
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c.apk
-
Size
1.4MB
-
MD5
520c1eb7583328ee55fbad2f63ed732d
-
SHA1
3978f8e6aff6d79bef675d5eb2930291fd149a26
-
SHA256
792c5229dc5de630a542a2dacb13e470a9fe810819a94de7836f15d612c4f56c
-
SHA512
3e3590db6831c6e44d34c80066cd1493cd06fa144ff3435e3d8fbb97c617c454ce331b069a59ae15aefba2af10b33a6c101ffea926a2c4091db6c353b6c8c435
-
SSDEEP
24576:aAcXBxI3xiR2qpNJCmWYuyjmzOW2Tr/fQ5j+0PQ8Eh9E7A2Fk:abxI3kR2I+YLmyzr/KPQ8EsXFk
Malware Config
Signatures
-
pid Process 4790 jeg.cwnnp.kuuxh -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText jeg.cwnnp.kuuxh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId jeg.cwnnp.kuuxh Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId jeg.cwnnp.kuuxh -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock jeg.cwnnp.kuuxh -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS jeg.cwnnp.kuuxh -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS jeg.cwnnp.kuuxh -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener jeg.cwnnp.kuuxh
Processes
-
jeg.cwnnp.kuuxh1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Listens for changes in the sensor environment (might be used to detect emulation)
PID:4790
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5b7b1026fee4ce9af4b6027083d531cef
SHA1c02d818ce1ad27e72bc8f4712a1a27183d97072c
SHA25616d46cf62a48148e97b3b22a8a52cfb672a24d34cd9a09631e0f94950f8b6fce
SHA512f0dcd83f1406fa61cd3976c4dfed743e1b3aba7d3f2c8a4ae8099d12295116fa4d229c89b23c36218094d3bd2157693186e0bc93e59516eb3f4b5fddcca357b8
-
Filesize
5KB
MD5ea4a48d4769939f4cc80f045d96ce12f
SHA113ea3d39834fd52c6c151e7115b71aec36f844d3
SHA256ebf00b0968e940d5c3466ca444fe00eced9648f1bca87b1061f13f98dbcac0a5
SHA512784b365f8031bd2aff5639f14d803fcd8555ea88031c210bbf0896121e25f4efed209c5675bd3f7d5663d75ab34ed01b43955f938e77c622195568a802c1693b