Resubmissions
05/02/2025, 11:04
250205-m584bavngp 1005/02/2025, 11:01
250205-m4n2ravnbr 1005/02/2025, 10:18
250205-mcbmcatmck 10Analysis
-
max time kernel
80s -
max time network
167s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
05/02/2025, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0.apk
-
Size
8.1MB
-
MD5
c889e75eb26de5a53531ca1d799a777e
-
SHA1
4c9ae2c8bc9a2bc02926ee2a9a49730881907a69
-
SHA256
cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0
-
SHA512
cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941
-
SSDEEP
196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2
Malware Config
Extracted
trickmo
http://mainworkapp.com/c
Signatures
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/aner.fos540.ex/app_fragile/py.json 4954 aner.fos540.ex /data/user/0/aner.fos540.ex/app_fragile/py.json!classes2.dex 4954 aner.fos540.ex /data/user/0/aner.fos540.ex/app_fragile/py.json!classes3.dex 4954 aner.fos540.ex /data/user/0/aner.fos540.ex/app_fragile/py.json!classes4.dex 4954 aner.fos540.ex -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId aner.fos540.ex -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener aner.fos540.ex -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone aner.fos540.ex -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener aner.fos540.ex -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver aner.fos540.ex -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule aner.fos540.ex -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal aner.fos540.ex -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo aner.fos540.ex -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo aner.fos540.ex
Processes
-
aner.fos540.ex1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4954
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5aae2fff1e66e2ed7098e6a244c9fafc9
SHA1cb45aa08a26f26d57e4ff2c38c87445baddd88bf
SHA2561f4ecd2ff4e128f1ff3da8e59d77d3b64eda9ba8514d76abae1f786bbe65420b
SHA512757310e3bb6855040b4b2a631f221e806721f5666257add6bf834c29b37a19fb953c42d3d04bbeedcd53d1ae1a2337bc61e36db046e46f1de18103e324fefb73
-
Filesize
4.9MB
MD5ad4a8dddb4b956662516a5353912f97c
SHA152b4eee991f8eac17572bc57f2b06dba9a6fddce
SHA25619fd2538eb94df4e5713d9bca304527c08f27a84118ee583fc263cda1ef3b10d
SHA51237ce05314e1e2a0edbe07f91208265e3c35a63142da54f60732736aa9cb8201dc78025682cb489e0e607826a21df38932ddbaa199fc86d246a91f42a614b2dd4
-
Filesize
17KB
MD5d780f836fe54e51872bf31220a4dcb77
SHA15136aa7fe35fb70c9bf0ab00bbe7f79cf65705ae
SHA25632abf05fd8eb1edb10fd93e2c0bd9b308d109e5686c06b39f4d173847a0efe17
SHA51262842bd62ea2f1a71880415d84501bc2cde8eb857d4baec4e357f3c4c4a74d2d0418bfcc6431789cce207d5290ceb4b1fee31f206ac527a8727176523c0bc635
-
Filesize
20KB
MD593e7f88ba7fd4f0152e8e5dc56f1acc0
SHA1f29883585567a32fe4d487e5df14173c39c09e65
SHA256dc6bc98e7f294d8994b3120cb87c0ed1d998e559daab810a68323a8968c60c2c
SHA512be40cb85f75181627e2e4f7fb01e371ad4ce5051416d7e931ae45479a1357526e89a017aa461de03076c0b650eb5c851c239e88556677e859bb9b7c28e48d745
-
Filesize
20KB
MD5d0177174e6d7fe5a180c6e8eeccd2756
SHA1204e1e2854d911f745ed78d4ea4dcf868150e70e
SHA256593295f1c83e10871f1c049911c2fd7020f4334bf950de98d7246f3c2642cbfb
SHA5122e330b99adb12f694bf90c9be2f431592386c04e026069168041ef4545576e466459f91af767247077724be7bae8baa05c527d756caa5cf625121cc1696e58fb
-
Filesize
512B
MD55635a3e9370ff4e4dafbe6958528cfda
SHA121be6c2d1eeb13281ea416bf0b680830a6a79bae
SHA2568706bbc68f2947f6a9c51a4dbaff1285aebc4ef76288af6ab0d3a5afed3317cc
SHA512f07cbe7be644adba0c99e3c7ac4e9d47be583183af9ed777d1e217863a5827598e94dac26d4971052848bba91ddb2939ef88490c6989a00624802f2b81df0446
-
Filesize
8KB
MD51431b9bee60b70b6b933792b66f676aa
SHA1056e95fa49cbf4eb1697dda1d514187690ba046d
SHA2565e9bb1c7e37eb567edcc464a85a7f0b5f9c185d6de0aa92245fb719803bda8e0
SHA512cbb942b7f578ac9fe78ae555b3b03805695bb4c9f00125f70842651256c45320fa60e6df0d3dc1e13834d5b26f950737c9c3e030fc2a149ab6faf94cf5966c78
-
Filesize
8KB
MD5ac1009bfd6af96a597c14bcc59c845ca
SHA1a403c668a912790b57b29637e2fa0cd9352d02c6
SHA25665df8e2f8b2ac9ea9a81539274135f8445f81287039b500d4c13e8245f7c80df
SHA5129c6bcee89df3aed074d055c07d1924b2715418d6e9f3432568a606a4c517a9846d39956abce4bd60c4d62a212c4e0eed69eba2d90e172190e08c59fa7d28eb1e
-
Filesize
12KB
MD547252798787e1be4370af0ca9afa53c8
SHA1c8a6b7919ca0d8d495f565b490105873a30fe8bc
SHA2562b6fb2c185b0c8b000b8e222de0d823e88f4131ef01a8a6eecec737c86fe3c87
SHA512ff1416b840c61e6fa13f257e34f254ec578fa95113d547c96965b76ba55a729a1a1989f163714b3fbad5a79516acdfa79504a90bd2412468792b2c137c44a77d
-
Filesize
256B
MD50c28bfbc63c74078623897bb930505c9
SHA123e358319150066270ce349a5afc2721ca9fa7bb
SHA2561333cb85aea2a722d2d51fdffdbcd9eff91b43d18519e4bd1b95ad367c90f28e
SHA512a78e761cbd3c361b04f62948f3aa026d9bf7a597b9079f78342bc240a92b52e4599367e3c8a8c2e02a2a229cd7854809adf1d3c26e4f71ab86ade9da3af401df
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a6056204782e91c574c6f98eec8fc019
SHA17ed9ae3fddd40bae22386c9e3dbcbe430d2641d1
SHA25627e12a6312cf6793d3cad812eec4565c579244a84e601633da13b1da5fccd527
SHA51289453106c0fa0a4a6e94e8d8a4da62cb86cfa971a1ded2449c2d9bec88340da4744e15cdca34deefe51e7e7001eb86eccce48cde36e7ca805be9cfcabfd41d18
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
173KB
MD5b23f051478c880d1f33b34b1aa5a91cd
SHA1f476187da4a5d0532499a4403673cb9de3e59cfc
SHA256801b80a70c8aa4db0852864c47b6c283854343e29ceb01b4ad31772caa57801b
SHA5128093007fdb145b29d131c7b2f5363b9b2bc5c909334cd2def4f0c3778edbe18307423afd937b29cffd505e75884f8756037a588191293846c3b096fb3efa8bdc
-
Filesize
16KB
MD55ab3e1e0768fdaa3f173bb0abce16e60
SHA125b344af2e8d4c946fb9956b0bc5394194ad59bd
SHA25676e54e9cdac35b39542a5b418d84d6ded8fff955bdf09385f91bd7a6be451e11
SHA5120aabf0f03b094ab1d60df17de736031e02ca3224fcfbb0ba2f14f9408885a2143bb7cdd560988ad802dcd6e871d7876ec83386ff68a1b0fc8d5d2a64436a6bd5
-
Filesize
108KB
MD59550571c269a47e565dbbaba3f252d88
SHA1afe313f46a2edf3082a3811b3f415d12a010b8ee
SHA256a6a4cc924228c219ddf4e2ec771b0c03ff4301efbe5af852f8ea86ac882f8676
SHA512189911b04a68afdfd39e337e187d652aaa4c5c02295ad3c3deea66a4702f414c66c802951c01681013bb0e87f08c3231497b1e401d67ac9eccea2342b11dbc98
-
Filesize
10.9MB
MD535d4cda95e19e9be467673c78e1e2fa2
SHA13868d4dda794c360f57ba650c332b39ce5c68d8e
SHA2566c84643bdddc36a15b515e72e8b768ba64ff6b8966492db9bce6660934f09746
SHA512577272d92633303f248c8545b67a5205489623ce44d746fcdc906ca29c0cdb26f83140f013510c356b709ead230da79fdd8b04654370a2c18275a3ac98344dd7
-
Filesize
308KB
MD587fbf4277c7b1354b07ab66e7841e5fc
SHA1f171167c1e22209bfe6f8e826763fbba7e2dd195
SHA256d604f9e58075636656da343d9efe1c1af4f225def49e4d288fc8a7442cb07555
SHA512c74f9f44d6b8d4b3c78b79a2710b66ebf851c6401b8e01926f910e44e4be7ce911286b385558797802eba7ae26b0d0ed06faee79e9e8bbe8ca798f7ce4e4f9fa
-
Filesize
264KB
MD5336b36c9bac9108ef167e46ecd780cf8
SHA12f2053b4858cbc16a7fd71634187b829e816e3ec
SHA256f144ad2da806b72948617d8d35426c21fb682d58c20c5002b3d41eefd80a07b2
SHA512faaee8913953353783666ec7917e9cbb6774c024369e069de530904a3664cd96ddf7bb0a4b261f7aa8458b33028b39c3af7d66fb62bd3885e7f7fde001c67401
-
Filesize
1.7MB
MD530465152db261852e3a226a666ec4304
SHA1442a188e07db85653022734d0a8537d4312aef38
SHA256c79795ea1d8f93d6471a6a10ae92f079fa7c79b0736de04edb53c5c5ae4862e4
SHA5123b9b75f7030fa9280130172a7b1f17766b3399270ec49b899d7f4223e68ce7ee728a0ccd5217b98d276da8f84968f4d436b4e61c7fcd378c3be0a57f906dfa63
-
Filesize
83B
MD5d43a76bc6c45885490edeea2f9f23056
SHA1adedb7dbf244ae7c2bf0674efd0e0f83099ff2fb
SHA2565dd67cffb2a8ec30e37bcffc078a87a739649779e70bab1f71f7f287773044a9
SHA512a4f16726aa3b3d16aeeafdccba1083fd452e5487a3e9d3f4a2b604ba26822fcf15bc76733a6857e9fc96998bc33a3ad318f935c256777ae40c44f2cb26d90bbd
-
/storage/emulated/0/Android/data/aner.fos540.ex/cache/records/com.android.settings_2025-02-05-10-22-03.txt
Filesize1001B
MD51c56b419f043be564ccf85c040ba4758
SHA128c97c81599d098b2034aa18abfc72c6c26ea956
SHA256e37f82553044557524cb0b7d2de8623384e03ba01d61cf1de79b2335577c00e5
SHA512ccdc36a1535485c1b62c64ed3ab1f1ae630494e4590506147468bbf0cddd5f5aad538a576a124da28637cd6e138c25ef91433d048ae8422b0d40772d6ae6fd24
-
/storage/emulated/0/Android/data/aner.fos540.ex/cache/records/com.android.settings_2025-02-05-10-22-03.txt
Filesize19KB
MD563fdb6b3ad424516aea99cd6fd5bda11
SHA17fd44eae842aee74f54a39f2d4a65949500c46d6
SHA2560073f8b3cbedcfb77b00dd0a596e61e5bf92fe0e72cf698e14aa3f6c3b799737
SHA512d9ac65be51a4fc04376ace9e694647f079e7f9532fc58657ff4e248d10cf6009d79c1d3d8aee49168ad05a2b605f44b5c24e5b0b6815c475ea1d7d15c18e0907
-
/storage/emulated/0/Android/data/aner.fos540.ex/cache/records/com.android.settings_2025-02-05-10-22-03.txt
Filesize37KB
MD52d339b67def2c22acf2af687ddf6ecc7
SHA1f61c42a3db4596621c28025da9110eb8af1963f7
SHA256ff36a6ef44ae8391e37eac82adb519ddff3adc338c41d0721a71d2e99d3108ff
SHA51262a8747f1e195d7a68a7c8bd5f9ac55624ca19df55fb9f019ede72c8cc889e041778ff9cad6c696f190c5f588b72068792cfbbbe44038f01878ce463d8f7f405
-
/storage/emulated/0/Android/data/aner.fos540.ex/cache/records/com.android.settings_2025-02-05-10-22-03.txt
Filesize55KB
MD5b40465b4bd112d2bf1beed0492174326
SHA1b7ea2ff0c880cdac31ab7d58d3776b55e2c124ca
SHA25616988f1267568c48685cad77d3120310ea61be0f0a48b761322b99cee76f44b0
SHA51278385a29176e9b297a9092dbd7b1eb53df8ce4adcd495407903aac951374bae8ba19899d600700008506e013964191ac6673a57ba910a23f1531a4eca7f21636