Analysis

  • max time kernel
    899s
  • max time network
    905s
  • platform
    android_x64
  • resource
    android-33-x64-arm64-20240624-en
  • resource tags

    androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system
  • submitted
    26-12-2024 22:26

General

  • Target

    launcher.apk

  • Size

    5.8MB

  • MD5

    18f81de9580046775b2e79b29fa20608

  • SHA1

    48a72a94ffb15ae87966b316c619a4be006b365f

  • SHA256

    d105e1343a9a692a3de2ac9bc38a6344f06ef05a76075df104333afdff72143d

  • SHA512

    6c7f777e8ddf31b0530e99c55baa5cc515ac36408a2291b9ad5fbf0fba5eaf57bbd86180e7866fdd74e297c1a2faa089d09138d89e5d4ec5d958b6ecad8853b2

  • SSDEEP

    98304:iI6dLbG1gvBprQnqkovnJNiNoWSPQXcgGnRumzeaLEsX7yzBEv0mO9gWKn:VKLl7QnqkOJN+oMMg8RpzeaLEslDn

Malware Config

Signatures

  • Makes use of the framework's Accessibility service 4 TTPs 1 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • build.ledear.vedgw
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Requests enabling of the accessibility settings.
    • Schedules tasks to execute at a specified time
    PID:4374

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Config/sys/apps/log/log-2024-12-26.txt

    Filesize

    13B

    MD5

    de2c41a51ee9246eb1708f65b511add0

    SHA1

    2f442d634c8a18760a232c8829d4b5d74a52f074

    SHA256

    ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab

    SHA512

    7cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a

  • /storage/emulated/0/Config/sys/apps/log/log-2024-12-26.txt

    Filesize

    138B

    MD5

    fc7e8ba942d7ae0664d101387f344a1d

    SHA1

    16067e7f2b12b6aa205e8cfc158241a346bb2f69

    SHA256

    6411aa867005bc3287e17df390269b0b792a5e5857b61143f1ccf041dc1c67da

    SHA512

    2a03abcc7cedf7759bf3bce57ca2a75f8eddf02b3389347b78f031423e237ee5d46a944125b6f3fea4a4e6f6724bb8392a1eee8d537f2aad3272f51771a10456