General

  • Target

    Kleepers.apk

  • Size

    4.4MB

  • Sample

    250107-gm8f6sxmav

  • MD5

    e1f4b4122ecc2ad4855b328c7985948d

  • SHA1

    039ac876b1ee58b6ae36c6ff624f74cf4db51d43

  • SHA256

    d809181888075b065469d8e8af0b0267741542418b7c60e6fe2c09ee494eae08

  • SHA512

    062fa1a9b565971f3e0faf365660e588893367387ad526130e7e5ff69c01e871c5eeda23f55c8f87c4304b2bf232ef7855debc33c02d9efe5efb64859d50ad93

  • SSDEEP

    98304:tXwRzBjTimzJl0tRSmC9JtkxQLg3/JCogWpCAd:uNzsR5CZkNPJYWpCo

Malware Config

Targets

    • Target

      Kleepers.apk

    • Size

      4.4MB

    • MD5

      e1f4b4122ecc2ad4855b328c7985948d

    • SHA1

      039ac876b1ee58b6ae36c6ff624f74cf4db51d43

    • SHA256

      d809181888075b065469d8e8af0b0267741542418b7c60e6fe2c09ee494eae08

    • SHA512

      062fa1a9b565971f3e0faf365660e588893367387ad526130e7e5ff69c01e871c5eeda23f55c8f87c4304b2bf232ef7855debc33c02d9efe5efb64859d50ad93

    • SSDEEP

      98304:tXwRzBjTimzJl0tRSmC9JtkxQLg3/JCogWpCAd:uNzsR5CZkNPJYWpCo

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

MITRE ATT&CK Mobile v15

Tasks