Analysis
-
max time kernel
299s -
max time network
301s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
25-12-2024 14:08
Behavioral task
behavioral1
Sample
97b57a4161923305dcba04fa8822be10c130083e2c5c24ad49a509f1cf1bd9ac.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
97b57a4161923305dcba04fa8822be10c130083e2c5c24ad49a509f1cf1bd9ac.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
97b57a4161923305dcba04fa8822be10c130083e2c5c24ad49a509f1cf1bd9ac.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
childapp.apk
-
Size
3.8MB
-
MD5
2e4eb67c47fcd577049a2b51de702998
-
SHA1
7d1253695a722679c3adddac860b79d33088d444
-
SHA256
47a9af3f2ebcd0cf940e0e4f5a65a8bf20af15786030e0b921709adade6cf2d7
-
SHA512
e8402ede8062c25f0693133355c1068386cb5427a8ed9c2ca0852980c8ce86fe24c3e372e642113152e9ff3d64dcd80c3341b00124df563c1f1be6405803721e
-
SSDEEP
49152:G6FQ0bL+VAttjJxbf43Bo1dJtp6CUIA1vmzJzdGG1QTOMQUhYqy0cgeRX2ikwWwn:xBZH2o1dJqvmzJzBaTa0teR7Wo
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: ecc6f5e6b0@apng
-
A potential corporate email address has been identified in the URL: gt@5
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId ave.fri.portuguese Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText ave.fri.portuguese Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId ave.fri.portuguese -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener ave.fri.portuguese -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock ave.fri.portuguese -
Performs UI accessibility actions on behalf of the user 1 TTPs 12 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction ave.fri.portuguese -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo ave.fri.portuguese -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS ave.fri.portuguese -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule ave.fri.portuguese -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo ave.fri.portuguese -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo ave.fri.portuguese
Processes
-
ave.fri.portuguese1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4787
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21B
MD5fbfc3753e49de35edfa29ac4d5925771
SHA1694b9067cd129fa3eafab5ef5e3bc83e5a2d4f22
SHA25607a5cb2ecfd86f8f2d28757ffb2a5daa4973477148b7e0fc569d48492965984c
SHA512c253ace16d973614ffdc8b7fa3b8e7abf655d450f7186050dd2c155f97d57ea8a65d07d5b62c7ea9d3b405da0551061cc1281a4ed0066d73b28d41e0a8105ac0
-
Filesize
21B
MD5e0fddd4b3263097526c231829b172988
SHA13904c7aa3b8d5b1b9a1c94eabcfbb33267abd510
SHA25655092658897ec6df89f8a134f237777fa906231726bdc00b5d5588c342d7ee2f
SHA512b78e8ad01772efdcfb52144c0e438b79eab8df6502f8a116156141e91750b7d79c779779758ec951d7dcf55b3de07b140d93d3ec773b020daeaef1a2caa1556a
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
276B
MD54761d146b85d870d94134c23416ab5f2
SHA1093b5c6f77be39976d583eacc4c88218d28a6e9e
SHA256b1b6fc149b3bc20621fa2ef8bc99573758be1223e3f6d58309d8948d104fa205
SHA5127fa6a6a00d7f74deef82e69a44e947627f220d79e0bec921493caee2f217b273b16e88b182d950d189df5066908b5d7d0fb8a2ec7bf8e33b7acd6e4a4fb8f3a6