Analysis
-
max time kernel
299s -
max time network
298s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
15-01-2025 20:57
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
ready.apk
-
Size
8.5MB
-
MD5
44ba18b169e7061ad00886f05f811df3
-
SHA1
1d5f9b6b5c401b270a45fafc4c1fb705337d75fa
-
SHA256
ba655b8860ecce2124ef407d1c271cff6a5d781a6f13569713499cdf25aae9ea
-
SHA512
03ac17ec0fc0894018f4c449823de6e8928460571e9fecd16a0cec4be34dd972083bda4edbc0b978c25430d9a7ed1cd7c444a5394d8f1d90cacf8795a75bd208
-
SSDEEP
98304:7m9ItsjoRUUj/O3bqHW4PcfIfk05ksmz7zBpTn0tMa:+8rDO3+HW4suk7zD43
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId regulation.questions.hills Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText regulation.questions.hills Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId regulation.questions.hills -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener regulation.questions.hills -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock regulation.questions.hills -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground regulation.questions.hills -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction regulation.questions.hills -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo regulation.questions.hills -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS regulation.questions.hills -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS regulation.questions.hills -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule regulation.questions.hills -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo regulation.questions.hills -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo regulation.questions.hills
Processes
-
regulation.questions.hills1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4305
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29B
MD5fcd3778acdf74aac692273ee090dc07b
SHA19e5b57992525e41d912c4c113eeadc40819ef677
SHA256ba009e9da19c6c3dd9457e939f364fd50768f7801aff0d09f706832d18b09a08
SHA512363b46a956159d2f87e9b5f7b94e2e0361fe9c76896397361a28019c5838d5e89acb2cf0c3d21d3e17238c89e893628ffc3ecc58f24edf5bbb836b6baf4be5cd
-
Filesize
25B
MD5ba30336bf53d54ed3c0ea69dd545de8c
SHA1ce99c6724c75b93b7448e2d9fac16ca702a5711f
SHA2562d6988fb5afdaafc4e33fa1f71d6f10c95ab5a49a8ec820add5b13eef05439af
SHA512eea34ca526e03349e746d3687ea660b4748f0174fe2ffdb65161e232e08630b345e03329614852ce881a71362ba68575e9dd08fa361a416e5b2fb231e21a0a3e
-
Filesize
260B
MD521beb4966a60f87d814fd4f6051d4889
SHA14dd446a26540dfc41b066b8871318351e9d8b18b
SHA256cecb94c348931391f578585d3cd3dd596d58836c00d3a6c4e65883686bdfd789
SHA5127d1713593428168ab6733470a9a028db5e6b88f970e621586f08d544920fec136b00f5b46d5cee430facf01d5f193889ef9630bd09fc495dccefa5189ed77ea3
-
Filesize
29B
MD5b9b530e2448252311640bbecb69b796a
SHA1215ede46fb42a68a7ae84c3019acb3019668a46c
SHA2565a290151305de1ec4f790cd8ada8bd68c076a2c4ed497c40a519509659b65150
SHA5125834499307946d130887067b2f837ddfef7fdfe3a7e5ed8977eb14c2dc1ab328334da35ed4c978e20b3e6b28ff30dbd12f0430f4b7c831481f339d360c260919
-
Filesize
69B
MD5cc615687edfbdcd34a043350cf1ce558
SHA12d91ee9dac29a69f3f4a098e0b6cc0a65c1d2569
SHA256bdce657753d5dcb43b5b01462b145113792d5a373155a1c3db90defef7d73569
SHA51281bf54fb9d172e755df29fb5e03fdee80f6b41f0c3fe2c53a7e79684cb968fe5f09bb9fab74ae11be5b8c76edfae1f86de74ca0835f5744ad3300a1aebb1bdcc