Resubmissions
05/02/2025, 11:04
250205-m584bavngp 1005/02/2025, 11:01
250205-m4n2ravnbr 1005/02/2025, 10:18
250205-mcbmcatmck 10Analysis
-
max time kernel
256s -
max time network
301s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
05/02/2025, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
-
Size
8.1MB
-
MD5
c889e75eb26de5a53531ca1d799a777e
-
SHA1
4c9ae2c8bc9a2bc02926ee2a9a49730881907a69
-
SHA256
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0
-
SHA512
cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941
-
SSDEEP
196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2
Malware Config
Extracted
trickmo
http://mainworkapp.com/c
Signatures
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Loads dropped Dex/Jar 1 TTPs 8 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/aner.fos540.ex/app_fragile/py.json 4246 /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/aner.fos540.ex/app_fragile/py.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/aner.fos540.ex/app_fragile/oat/x86/py.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/aner.fos540.ex/app_fragile/py.json!classes2.dex 4246 /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/aner.fos540.ex/app_fragile/py.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/aner.fos540.ex/app_fragile/oat/x86/py.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/aner.fos540.ex/app_fragile/py.json!classes3.dex 4246 /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/aner.fos540.ex/app_fragile/py.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/aner.fos540.ex/app_fragile/oat/x86/py.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/aner.fos540.ex/app_fragile/py.json!classes4.dex 4246 /system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/aner.fos540.ex/app_fragile/py.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/aner.fos540.ex/app_fragile/oat/x86/py.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/aner.fos540.ex/app_fragile/py.json 4189 aner.fos540.ex /data/user/0/aner.fos540.ex/app_fragile/py.json!classes2.dex 4189 aner.fos540.ex /data/user/0/aner.fos540.ex/app_fragile/py.json!classes3.dex 4189 aner.fos540.ex /data/user/0/aner.fos540.ex/app_fragile/py.json!classes4.dex 4189 aner.fos540.ex -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId aner.fos540.ex -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone aner.fos540.ex -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver aner.fos540.ex -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule aner.fos540.ex -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal aner.fos540.ex -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo aner.fos540.ex -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo aner.fos540.ex
Processes
-
aner.fos540.ex1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4189 -
/system/bin/dex2oat --debuggable --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --debuggable --generate-mini-debug-info --dex-file=/data/user/0/aner.fos540.ex/app_fragile/py.json --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/aner.fos540.ex/app_fragile/oat/x86/py.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4246
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5aae2fff1e66e2ed7098e6a244c9fafc9
SHA1cb45aa08a26f26d57e4ff2c38c87445baddd88bf
SHA2561f4ecd2ff4e128f1ff3da8e59d77d3b64eda9ba8514d76abae1f786bbe65420b
SHA512757310e3bb6855040b4b2a631f221e806721f5666257add6bf834c29b37a19fb953c42d3d04bbeedcd53d1ae1a2337bc61e36db046e46f1de18103e324fefb73
-
Filesize
4.9MB
MD5ad4a8dddb4b956662516a5353912f97c
SHA152b4eee991f8eac17572bc57f2b06dba9a6fddce
SHA25619fd2538eb94df4e5713d9bca304527c08f27a84118ee583fc263cda1ef3b10d
SHA51237ce05314e1e2a0edbe07f91208265e3c35a63142da54f60732736aa9cb8201dc78025682cb489e0e607826a21df38932ddbaa199fc86d246a91f42a614b2dd4
-
Filesize
17KB
MD5d780f836fe54e51872bf31220a4dcb77
SHA15136aa7fe35fb70c9bf0ab00bbe7f79cf65705ae
SHA25632abf05fd8eb1edb10fd93e2c0bd9b308d109e5686c06b39f4d173847a0efe17
SHA51262842bd62ea2f1a71880415d84501bc2cde8eb857d4baec4e357f3c4c4a74d2d0418bfcc6431789cce207d5290ceb4b1fee31f206ac527a8727176523c0bc635
-
Filesize
512B
MD5bfb0ec9aafcab1661974de7749b40385
SHA1c5e782c6add4713147a36380e5883b9958a74b45
SHA256d543860941b089f8fe975cf490d9311e585dcdb8f681d23f3d94399f83e9f2d6
SHA5129f2af8ba7f528a4ccc629dad4633c27dd0bb4be2b086c4b2ed6810358e6f7e3076ceb4d3275001a7f8cd310e071acba22fb50073b779445e141433d11c038a06
-
Filesize
32KB
MD572c53fc8fe8552fbf8c0d793937c5b4d
SHA1fb7e0d4787307cc6ee5d4e4cf94f62634f723669
SHA256b0dbf9bee9c004bfa8a294d010b06bf3f8bfcc916d77b5d8cf9691bb69207b5f
SHA512b7573bda6347d2db7d85c512eb7bcf7f8c3a82d4d9a80e34832f88e5b6606b5c866c0a59f85fd33c30cebd0ee5c2995e67a3162a18291691e8820d4e38b93a85
-
Filesize
256B
MD5578e420333b4ec4810107f2fcd8fcbac
SHA1f0483b44edb8cd02c6fb4e9f346884a5ba89bcb4
SHA2568659ac8c729b5174f83a51d3be2874baa6a9ec30195ed2d4dec6253bef9f657e
SHA512bbabc4f2dfb47eef6686faf9da7896b156159483f058ac7d9c36f369c8e2b9e2339ee4db9eb1eec6df4fbafbd96ddb67d209d1d3c2740a985174faa7d72e5675
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5bbc9b0dddf74bf886a8056fb81d0a958
SHA1f31b27fd1a9aca49ed708706331571e38eb6be74
SHA256757b934bececa80ae349af88e11df1fca90912e40aa30bcc3c3af19345c45ed4
SHA5127aed967d3c4a0f6756a28f0401dda4cc34badd82ee331b63e60de4ea9dbae4c4f4dc9cf8cb6969038c2117a3255df660a7fdbba52754337e30b836dbeae8206d
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5498eeced8015b079649fa454fcb4b273
SHA1c05aef1890739539a85bb32ae83321e170b7e914
SHA2568ac839b7a4330aba3485884aa05c0f50178f868c2bce00aa7e4ae4d6056076fa
SHA51213ca50b71cc631a8e1a05cdccf8dff00b9904275a9facb6e16f85d21f9801f33c9b52d88e08f1ff75bc73bc1a24cbf398ebf33d2301fe7d6eefdb0a441269aa1
-
Filesize
173KB
MD593d2bdbb84e80bb73cc7fb52a1ed840f
SHA1db3d38583c5d321497975e97f6c3a03b4fda6fd2
SHA2560508a888c42d93fd9515705a8fe6333d9fd1de66adaf8a7f74f4067cfd2f6e2a
SHA5123b3b5afac132da4568488490437ec637cdb8a9f171c06cf265ad8a32e997bfe8bb59afa6d57ad580220c6bdf2227473cf2c3f5a743b7e9ebd8e274538264afe1
-
Filesize
16KB
MD53e5df80d1a283a20a1e4ada08278e9ea
SHA132d92ce1456b1374f3e4a9cd94d8b28fb6e04035
SHA2567d886d0bf9c770598da60564abc17accc37c13cd2321b5fa9d78dccbb24ed0e7
SHA5125d33c4111683b219ce3e3ada9f8c60637ae8aa934f282b8671e5ccfcd9a2923da7809e5c08e6f5349bcaac21cdc5814878ce83118bec8afc51f0d23879a4f7ee
-
Filesize
10.9MB
MD535d4cda95e19e9be467673c78e1e2fa2
SHA13868d4dda794c360f57ba650c332b39ce5c68d8e
SHA2566c84643bdddc36a15b515e72e8b768ba64ff6b8966492db9bce6660934f09746
SHA512577272d92633303f248c8545b67a5205489623ce44d746fcdc906ca29c0cdb26f83140f013510c356b709ead230da79fdd8b04654370a2c18275a3ac98344dd7
-
Filesize
308KB
MD587fbf4277c7b1354b07ab66e7841e5fc
SHA1f171167c1e22209bfe6f8e826763fbba7e2dd195
SHA256d604f9e58075636656da343d9efe1c1af4f225def49e4d288fc8a7442cb07555
SHA512c74f9f44d6b8d4b3c78b79a2710b66ebf851c6401b8e01926f910e44e4be7ce911286b385558797802eba7ae26b0d0ed06faee79e9e8bbe8ca798f7ce4e4f9fa
-
Filesize
264KB
MD5336b36c9bac9108ef167e46ecd780cf8
SHA12f2053b4858cbc16a7fd71634187b829e816e3ec
SHA256f144ad2da806b72948617d8d35426c21fb682d58c20c5002b3d41eefd80a07b2
SHA512faaee8913953353783666ec7917e9cbb6774c024369e069de530904a3664cd96ddf7bb0a4b261f7aa8458b33028b39c3af7d66fb62bd3885e7f7fde001c67401
-
Filesize
1.7MB
MD530465152db261852e3a226a666ec4304
SHA1442a188e07db85653022734d0a8537d4312aef38
SHA256c79795ea1d8f93d6471a6a10ae92f079fa7c79b0736de04edb53c5c5ae4862e4
SHA5123b9b75f7030fa9280130172a7b1f17766b3399270ec49b899d7f4223e68ce7ee728a0ccd5217b98d276da8f84968f4d436b4e61c7fcd378c3be0a57f906dfa63
-
Filesize
83B
MD5e30edc58056a6ead7e80f446e0fba7e9
SHA1e411ca25e818fe85bb42546134e4abf936e951f7
SHA2568ace0e805c975f646e6de5c5245e059f6a64fcc7659046ef5579d58dee66d3ef
SHA512be839398456035f4ec58af4d66d418b075228272af426ecc5a7d0673320363c5e87e68e1e7c7933f7c4651b5f7d687bec1455664944ebe2ba207113f18dd2d5e