Resubmissions

27-12-2024 22:22

241227-1986rs1nhk 10

27-12-2024 22:19

241227-18hmes1ner 10

General

  • Target

    Telegram_Dropper.apk

  • Size

    7.3MB

  • Sample

    241227-1986rs1nhk

  • MD5

    67bc00dafd3ef29a204478bfb82b7191

  • SHA1

    0e4dafd5c4592055d7b415b4e4ec67a46e356284

  • SHA256

    fb487eed45b9baf2eaabae28e3a3ae119be9f24b032358c1019d0bcb060ee64c

  • SHA512

    1298ee07f3a30e012d41e35f2551c8f2a1d5b0f35e42b762d01de254d1626612e23876bda70750476ccf13c217053bdb40e4f6664c03597e9bfcbefba7667104

  • SSDEEP

    196608:uraLLhlTLrrXZjnwevooPwGzrESQw0WsOfkml1M90jY:urAzTDXZNgEwGzoSlvsmkml1M90c

Malware Config

Targets

    • Target

      childapp.apk

    • Size

      4.5MB

    • MD5

      911a115e3c3398b702c1e1ffa91558df

    • SHA1

      6ee731d68f1d91585dce899fc3c5a2dc21c60219

    • SHA256

      f724d73ecd14c34760ace61d9541c3d2afa7c742c06df5b1d00f64b2f8fd45cc

    • SHA512

      fa35dff989cb573f100b16bd79a6fb91c9f6984402c702202d75364f9e8cc79a95a371dcbd0ecaa2f48a7d0d181052fc8a7a4e4395ccb1495f644bee4bce5c2e

    • SSDEEP

      98304:d58KoJ0vCqXyp52RRBZ66Rru4dA70xpmz7zBsTy0tQdNwmkej:dgVqX2oRO6Rru4dA70CzmxUJ5

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Launchs application uninstaller.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks