General
-
Target
8b6d047c9a1985c0c15ef0452828e8a77270fe122f51b953d16f0d81c507cce3.apk
-
Size
8.2MB
-
Sample
250108-gk1csaxjbs
-
MD5
6bc387da039c291fb62616d6e8074823
-
SHA1
83d6bf50024cb4e955a9392bb68311ad05f74290
-
SHA256
8b6d047c9a1985c0c15ef0452828e8a77270fe122f51b953d16f0d81c507cce3
-
SHA512
712ebce39bf9cd9eb3506b935e6c7819b845558a495bd6d9de8acf54fcdff3222552666ae83500a90fec2f6aec6942386256993c768deddfb52f578d5221903c
-
SSDEEP
196608:+aI3W+FAOiCyrWC+DFB7jKIyXfipcLpuLqp8IwcFyWIBcDRDKDrDjDCPDvDADgtJ:y31+Dr8FpR4umqYZIK9ev3O7UkJ
Behavioral task
behavioral1
Sample
8b6d047c9a1985c0c15ef0452828e8a77270fe122f51b953d16f0d81c507cce3.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
8b6d047c9a1985c0c15ef0452828e8a77270fe122f51b953d16f0d81c507cce3.apk
-
Size
8.2MB
-
MD5
6bc387da039c291fb62616d6e8074823
-
SHA1
83d6bf50024cb4e955a9392bb68311ad05f74290
-
SHA256
8b6d047c9a1985c0c15ef0452828e8a77270fe122f51b953d16f0d81c507cce3
-
SHA512
712ebce39bf9cd9eb3506b935e6c7819b845558a495bd6d9de8acf54fcdff3222552666ae83500a90fec2f6aec6942386256993c768deddfb52f578d5221903c
-
SSDEEP
196608:+aI3W+FAOiCyrWC+DFB7jKIyXfipcLpuLqp8IwcFyWIBcDRDKDrDjDCPDvDADgtJ:y31+Dr8FpR4umqYZIK9ev3O7UkJ
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1