Analysis
-
max time kernel
149s -
max time network
148s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11-01-2025 05:18
Behavioral task
behavioral1
Sample
d1316092677bef687acd67c7e20843ef515c10e78f3ac9af28fbbcaafede63a2.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d1316092677bef687acd67c7e20843ef515c10e78f3ac9af28fbbcaafede63a2.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d1316092677bef687acd67c7e20843ef515c10e78f3ac9af28fbbcaafede63a2.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d1316092677bef687acd67c7e20843ef515c10e78f3ac9af28fbbcaafede63a2.apk
-
Size
5.5MB
-
MD5
953e8995bab0ec46c3a78c2499fc09d1
-
SHA1
8a75a1bb880ac52879d7daff05f067e5da263ee9
-
SHA256
d1316092677bef687acd67c7e20843ef515c10e78f3ac9af28fbbcaafede63a2
-
SHA512
55600e4486b1a104dc223bb319fd70a9d9f391bd1c4932c9b4ec3fe5ff05fafbae8905623ff34e6d5dbbd64135c6b21f6740d68052e86c2db334ecbcc5436517
-
SSDEEP
98304:rRiR0tsTZi0zBzmzLLTvQDJasXoSU5KKhf1gnHncp9hkIXGYs:rRPoYNzLPvQDJx/UHtKcp9hkIXK
Malware Config
Signatures
-
pid Process 4497 chad.correctly.slots -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId chad.correctly.slots Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText chad.correctly.slots Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId chad.correctly.slots -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock chad.correctly.slots -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground chad.correctly.slots -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS chad.correctly.slots -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule chad.correctly.slots
Processes
-
chad.correctly.slots1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
PID:4497
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45B
MD564812e80d39fe17ca74402f601492aa6
SHA1b3fc823e5a40c1a3523d427c7d43c94a2a127ed5
SHA256ac875da5cbefee78e616213b61ac41b5dae237fc9595f7ffdcb47fc3daf4d57a
SHA51284486d8e8abd766bff566555c8cab8b710f16665fbcd1a4cd9a24649b345435dbcb3d0f14e3727aebb5f7212e19613e84ecafc8a9187536d3a14d031d0e1b2d7
-
Filesize
45B
MD567517b65131b3205da5d7e3fad0a57b0
SHA117eee3bb6cf58badd7dcded97773030930223cc9
SHA256bb11c25b8a41aa4fd15af067904c42c83c207fe6db4ccd809a75d53298126c8b
SHA5125a2659caf708d398491b16e953f61d1b487ca606357f1e2d52bbadccd76a3c40c9420052f0f876fba7cde0c200b2e9464d528bd3dd0b5da2fdfa92c1fb86db66
-
Filesize
53B
MD5db16758edea1532fc56613f025618b36
SHA12bbf576b6aee92acdc3c0df9bf71fc27522fd46c
SHA256a969f56bf8bee0aec1b42255fe9e300139eea05b4d08fa889eb9e763383cdf96
SHA512bac61562f76f7e7502df72f953d26cd4de333931286536ba33d3b8b226dc4c8c3c34a16603f0ca60a406cae498526a0e878c2fb46c43f13d42264a80b8b7311e
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
296B
MD5f881c829d67d7c1b2c03f3fc07c49744
SHA1f73a53f67e100b26f6ee9bc2a9179e254f709e83
SHA25691b014669a0cff5821a9a81c830b061016e1859b48b75e07ea3ad7b698e955e8
SHA512c3c93e1ff606834803df354a9606c20b6612aa0724f2442ba92913f56251bbf1e07d3174021f5d2845c8afc2771637d9f97adaf9cd2a156df13a612f34bd5084