Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
17-12-2024 10:42
Behavioral task
behavioral1
Sample
c71ef3dd95d32d8c35e601b9c702a6e0e16de452f6d0ce8d2014cb89c537e125.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c71ef3dd95d32d8c35e601b9c702a6e0e16de452f6d0ce8d2014cb89c537e125.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c71ef3dd95d32d8c35e601b9c702a6e0e16de452f6d0ce8d2014cb89c537e125.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
childapp.apk
-
Size
4.4MB
-
MD5
eb948696d66487ac2bef0fa563dc92c0
-
SHA1
38177babf108280ceca770755aec1ad6d20721c8
-
SHA256
ddf47d6e6c046957d7b244a58d6e10c4ff6bfb526c994aae27b02994d21e6d29
-
SHA512
284fd723b9e92909ed838e7e3ad07d9e26031dd0e72cd0450df8de4d9f02ee35930e851fb35c1d747f596cec5533a26c9f03dd1208cfcd42a6705f6ae301dfc6
-
SSDEEP
49152:VupgmJc8zdGGaQTO7mz6eYq490cg0yUPJ5rlSDRpI3ycqaDmWnwWUup8bB9Ij5SL:d8zB1TQmz6590tyJz4cEcm+7UpUa908H
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId build.ledear.apk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock build.ledear.apk -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS build.ledear.apk -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule build.ledear.apk
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
25B
MD59c2f35b4f6917efa566947d609e07433
SHA1f53ff85a73901f2ad432c997eab0c757ebca6309
SHA2564d540b5c2e2ddb297cad74a89d731157ba28df9c4f9d09048bd5b705fdbdbdd0
SHA512c1d011fceb1d208a6e72c513b5f0dc600c2ef523d2ff40e85be5c5e3bfb98a2ebb1c3ab8147da299ca23986db251791b230ffb1c7f9648e8d5bd5bb0962ff5bb
-
Filesize
345B
MD588810c28d4c91c3691cf6ae59bf8eee4
SHA1bba7613ead213500dc66ee7ed5f6b1ebd9860f6b
SHA2565944f0ce589552f6b19db170afa40b48ee068d435c277b947f3ec947d6e6d086
SHA5127ba59554d520f34c89353012ab31561ff2adf77371b44a590f24d38fb65fbd6324d90acaec04eced5c59c796ef885c5e4352db739f2b6776ec4fb027fc46a6c8