Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
05-02-2025 13:27
Behavioral task
behavioral1
Sample
BURLADOR NEXT.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
BURLADOR NEXT.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
BURLADOR NEXT.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
BURLADOR NEXT.apk
-
Size
4.4MB
-
MD5
9eb8fa5f616971557256bad7574c5f14
-
SHA1
963742c9ebc25275a47a2bfcf8a61b9148cdd4bd
-
SHA256
70cb4f240a1f4da74ba181bd27df253dd07098db8b0941092f68359256f62909
-
SHA512
70787e3da18072157dad1ee72da2489027097b01e920332110e345d5ad466f46dfc5e9597a4188301a9f73505f735e1f6368dfcb6098280a9baf7c7afeccec04
-
SSDEEP
98304:bqRTCU8hWKNq3XwYOcmyzFK5ro+mz/zB2Tt0tQIkJRY:uqsKwAtyGroZzwiuO
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId final.hybrid.fun -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock final.hybrid.fun -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 0.tcp.sa.ngrok.io 71 0.tcp.sa.ngrok.io 124 0.tcp.sa.ngrok.io -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground final.hybrid.fun -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver final.hybrid.fun -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule final.hybrid.fun
Processes
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
Filesize
17B
MD59d420d52228fba537daeeb7bd56cabe6
SHA1ca1d75bdb36b3839926c4934ca49614d4f4cb380
SHA256b145c5cb339a4a8af7df5284ab405243b503903aef0dc5069eec735dd8342745
SHA51201af3471b612de87ee5877e20abcc8a4bf3bcaac700dbf782533cf3383d6587b09f358ac324dab246494096cd31f9bc58069acda627267f44da1a1f2a2d78c94
-
Filesize
65B
MD598eeed90dbc49ac602359b689e0cbe1e
SHA1d71dd8464719fbace1755d70b5ca04561986d48f
SHA2566918f8f2b91dc315035dc1ee4d779c89904fa29aa5920771fc2dfc8e3f830306
SHA512787a616c8102720fd79e25b3ba9eb4a443af27e7f0e31b38abd220b4314cf15e66d6f72b8bf4c2c0ccf6cc68c3cc8371ea8d64f95fd6951a1923cc19d64cf93b