Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-9_x86
  • resource
    android-x86-arm-20240910-en
  • resource tags

    arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system
  • submitted
    21-12-2024 22:14

General

  • Target

    ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4.apk

  • Size

    1.2MB

  • MD5

    eee4ed4095f0998c7a5ffe7beed509be

  • SHA1

    d61dd19f460238a13050ba0b0336bd137f22b147

  • SHA256

    ead9f9ebe2e50d869fa82f5ede306c2c9ab89d94f4457e8388201786e12c05c4

  • SHA512

    af408ee4d3d41bc8aef51decfd27a4b8b1561a443b3ffe17a9cc8ded4e251401b7efeb73c1c80c3554592cdd124d46b4fc72889ce8dab76648fa92c09c8c50e1

  • SSDEEP

    24576:KhszzJltPKfD0FWe2wlESB5O83oevBY6dUB/wSmjSEwdjqkD:K+zVKf2W2lXBM41vBJUtwQrdZ

Malware Config

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

rc4.plain

Extracted

Family

octo

C2

https://94.156.65.160/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.net/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.com/ODRiMzk3Njg3ZThk/

https://scorpionxxxtention.xyz/ODRiMzk3Njg3ZThk/

https://scorpionxxxtentionss.net/ODRiMzk3Njg3ZThk/

AES_key

Signatures

Processes

  • com.sciencesecondwv
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4215

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.sciencesecondwv/cache/mvitnhnsc

    Filesize

    449KB

    MD5

    16bd306b6399964802d5d472eb9c83ec

    SHA1

    901489045df822f6e137f4d4203685608369ee1a

    SHA256

    6868cc3acc45d2840cf8ec6be37cc789c7a187811c0146f8ee1eb6687ec4c542

    SHA512

    51850b4bc333188baa260ddd2a21ca2c9175412e428ec618ea190b8e6e9aaaa28495bbd1b81107946ff8f81baa4f6083cc1907b08c6f28ccf72508a58285d074

  • /data/data/com.sciencesecondwv/cache/oat/mvitnhnsc.cur.prof

    Filesize

    464B

    MD5

    45cf919e99a3e403991092c99f2d9ffe

    SHA1

    e82faef8e5a783ee444ee835ef1cf7fe75453675

    SHA256

    e77b078de061e679dc68cc56eed25dd4309f74ee369e1ae3063c27b04cc06f1b

    SHA512

    cd5b65c42e90f104dc5722c3e46b956e50633f2ded377436211e4c299433afe11e74ab0f9555b187d305b6f5afa248eb00fda8cfb586e01936ac1effc7456b38