Resubmissions

13-01-2025 15:53

250113-tb1cmszmdj 10

13-01-2025 15:48

250113-s8783szlen 10

13-01-2025 15:45

250113-s683laxmby 10

General

  • Target

    085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238

  • Size

    3.5MB

  • Sample

    250113-s8783szlen

  • MD5

    2be0c2b438dbc8dd89c0ed34db466f7d

  • SHA1

    c795e972b09cb5a15e7e30ab6d6faad88aafc678

  • SHA256

    085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238

  • SHA512

    0cef57fff738ed45833b3d4ea657b71a329b5c8fc1206be680ed33490537621c1654e15cfaf687de20be0d2fb8181630fb12e18ba4e49602f234efe624f6bfce

  • SSDEEP

    98304:3Z1IWbE4aPTHP5J2P2R1pozWaLIXf9Y6NJgd2ofrZD1y889wL:3LZFqTHP/2YjozWUIXfO6Puy889wL

Malware Config

Extracted

Family

tgtoxic

AES_key

Targets

    • Target

      085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238

    • Size

      3.5MB

    • MD5

      2be0c2b438dbc8dd89c0ed34db466f7d

    • SHA1

      c795e972b09cb5a15e7e30ab6d6faad88aafc678

    • SHA256

      085d7e2fafc8b6aad0bd0e8361c5dae7249afa34ebd43d66278af27ace60b238

    • SHA512

      0cef57fff738ed45833b3d4ea657b71a329b5c8fc1206be680ed33490537621c1654e15cfaf687de20be0d2fb8181630fb12e18ba4e49602f234efe624f6bfce

    • SSDEEP

      98304:3Z1IWbE4aPTHP5J2P2R1pozWaLIXf9Y6NJgd2ofrZD1y889wL:3LZFqTHP/2YjozWUIXfO6Puy889wL

    • TgToxic

      TgToxic is an Android banking trojan first seen in July 2022.

    • Tgtoxic family

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks