Resubmissions

05/02/2025, 11:04 UTC

250205-m584bavngp 10

05/02/2025, 11:01 UTC

250205-m4n2ravnbr 10

05/02/2025, 10:18 UTC

250205-mcbmcatmck 10

General

  • Target

    cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk

  • Size

    8.1MB

  • Sample

    250205-mcbmcatmck

  • MD5

    c889e75eb26de5a53531ca1d799a777e

  • SHA1

    4c9ae2c8bc9a2bc02926ee2a9a49730881907a69

  • SHA256

    cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0

  • SHA512

    cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941

  • SSDEEP

    196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2

Malware Config

Extracted

Family

trickmo

C2

http://mainworkapp.com/c

Targets

    • Target

      cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk

    • Size

      8.1MB

    • MD5

      c889e75eb26de5a53531ca1d799a777e

    • SHA1

      4c9ae2c8bc9a2bc02926ee2a9a49730881907a69

    • SHA256

      cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0

    • SHA512

      cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941

    • SSDEEP

      196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.