Analysis
-
max time kernel
140s -
max time network
153s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
08-01-2025 03:44
Behavioral task
behavioral1
Sample
c4ffcc636a0cd535ed86ae31c5311a9da7a0951f62b41f98d229d680a8ba574d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c4ffcc636a0cd535ed86ae31c5311a9da7a0951f62b41f98d229d680a8ba574d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c4ffcc636a0cd535ed86ae31c5311a9da7a0951f62b41f98d229d680a8ba574d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c4ffcc636a0cd535ed86ae31c5311a9da7a0951f62b41f98d229d680a8ba574d.apk
-
Size
15.7MB
-
MD5
e2251311fc8acf5de09952fc451a752e
-
SHA1
f2c651584be93d84f7ea66e2c2c5dc4ebcb1d058
-
SHA256
c4ffcc636a0cd535ed86ae31c5311a9da7a0951f62b41f98d229d680a8ba574d
-
SHA512
f31add99459b749071ae7e5e940ac3e440aae5f17dfa335ffbae9f5ee00d434c7cd2448d94c74166a556fb503e56462541313c9861e41e6494dff37448088210
-
SSDEEP
24576:YoWgP6AWRuEjdpP4V9YeNkA1LJQX0qQxnh:lvYwPY09k0Xxh
Malware Config
Signatures
-
pid Process 4263 permitted.condo.respectively -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId permitted.condo.respectively Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId permitted.condo.respectively -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock permitted.condo.respectively -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground permitted.condo.respectively -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS permitted.condo.respectively -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver permitted.condo.respectively -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule permitted.condo.respectively
Processes
-
permitted.condo.respectively1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4263
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5d97615906510446bff6ff42f8933c9c8
SHA1eddcfb510c64ed615036ae5763ce71e39d229dfe
SHA256fa0871d303e54951941de6170567be6be05d774489a4576cd9f8a9a71a6af72d
SHA5120589a73a748f947510465e03a15b51c82650f012ab36cc1127752dc5b9ba4323b2c8dcbef404975a7ed66cb566a63ead83f422653008701b7bf701ae1ad73439
-
Filesize
33B
MD5c5eeec129870dd069e1b353ddcd6fe60
SHA17849bb170a85ab2f929efbadfff6cc6f06c3bd32
SHA25611f2fa2034cbff5198427931b6a3f2bb9be2d7076dfaea20e62a7b91d2326cbc
SHA5124a7b9db60cf8229cc6376deda79ff07b00bd60427925f7cc91060b9b8019c7fb620c651def20b928c6ec6eaed1976b441093a1118795cc8632f6160e2347929a
-
Filesize
284B
MD563918b85145b30924f50b21178452440
SHA19b5eb6e1075a0096bd5bc033c0eb48f4f4b459f1
SHA2569f8853a0eb21aa0eb9d8ec6e743bbeb2c9cb6844bdfdadfea61cf899739a461f
SHA5121bf064d75074366de6eb545272ad9d0da632390b77d90d5ff4a63c7a801ef38df711f409923e6417ec7f2e9d052541e9e241897a4da87198531a06f151444e3d