Resubmissions

13-01-2025 18:05

250113-wn9g7asjat 10

13-01-2025 18:02

250113-wmhyvatpgp 10

General

  • Target

    faca6f37c60a21804ad72938553da070f7641bad0a29084da9babfa22e495be6

  • Size

    3.7MB

  • Sample

    250113-wn9g7asjat

  • MD5

    0fde05a59f67cf457fb60b55793e8cb6

  • SHA1

    de648669eb42fc30c300615de65922fd1a01a166

  • SHA256

    faca6f37c60a21804ad72938553da070f7641bad0a29084da9babfa22e495be6

  • SHA512

    7d1e643febdf2a45fefa78f5be947834a637883a1adad3b8cbe5bf89c1fd6acd5d99b1b67df89799d03a44961cc6adb16ba298a9c4d896aaa81a7edada098047

  • SSDEEP

    98304:dz1y8VQyJ8pVZflV3BdXs0DDVaLccrz8e:ry8VZ8pXfl9Bd80XVUccH8e

Malware Config

Targets

    • Target

      faca6f37c60a21804ad72938553da070f7641bad0a29084da9babfa22e495be6

    • Size

      3.7MB

    • MD5

      0fde05a59f67cf457fb60b55793e8cb6

    • SHA1

      de648669eb42fc30c300615de65922fd1a01a166

    • SHA256

      faca6f37c60a21804ad72938553da070f7641bad0a29084da9babfa22e495be6

    • SHA512

      7d1e643febdf2a45fefa78f5be947834a637883a1adad3b8cbe5bf89c1fd6acd5d99b1b67df89799d03a44961cc6adb16ba298a9c4d896aaa81a7edada098047

    • SSDEEP

      98304:dz1y8VQyJ8pVZflV3BdXs0DDVaLccrz8e:ry8VZ8pXfl9Bd80XVUccH8e

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Tries to add a device administrator.

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Mobile v15

Tasks