Analysis
-
max time kernel
145s -
max time network
143s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
08/02/2025, 05:18
Static task
static1
Behavioral task
behavioral1
Sample
PrioritySupplySystem.v3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
PrioritySupplySystem.v3.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
PrioritySupplySystem.v3.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
moguyamenefe.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
moguyamenefe.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
moguyamenefe.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
PrioritySupplySystem.v3.apk
-
Size
9.0MB
-
MD5
86baf6edee547f4c4d7b87ad9330f028
-
SHA1
8d7a9f6562589bd773fee03d712ec150dd43a6bc
-
SHA256
e187cc809373b2a7d3f0a8c26a348cc75e1b80f8e42aada74461ea1dc1cc86b6
-
SHA512
0d41135d0b3d37ed4ecfb49ab1cf8703584e3affa294ae7b23fb23886839a0dff95346b087937c56da0deb0f39160a609d12a8f7b70e9633a6eca6699a7697de
-
SSDEEP
196608:TLstobPpq49JdeAXihFL8m+P4LNMMkQrRjjea:ctYBP9uFm4hMYoa
Malware Config
Signatures
-
Antidot
Antidot is an Android banking trojan first seen in May 2024.
-
Antidot family
-
Antidot payload 1 IoCs
resource yara_rule behavioral1/memory/4257-0.dex family_antidot -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.vonesu.digital/app_jaguar/LnBrl.json 4257 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vonesu.digital/app_jaguar/LnBrl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vonesu.digital/app_jaguar/oat/x86/LnBrl.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.vonesu.digital/app_jaguar/LnBrl.json 4232 com.vonesu.digital -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.vonesu.digital -
Requests allowing to install additional applications from unknown sources. 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.MANAGE_UNKNOWN_APP_SOURCES com.vonesu.digital -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.vonesu.digital -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.vonesu.digital -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.vonesu.digital -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.vonesu.digital
Processes
-
com.vonesu.digital1⤵
- Loads dropped Dex/Jar
- Queries the mobile country code (MCC)
- Requests allowing to install additional applications from unknown sources.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4232 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.vonesu.digital/app_jaguar/LnBrl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.vonesu.digital/app_jaguar/oat/x86/LnBrl.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4257
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
594KB
MD5ac28f00286f4cc41a03be33f226c6ffc
SHA168999b431e969a8eb9a6db438d4f70e977b2db2a
SHA256f5e3e5c683b23ac141d0593f6ddf4ec9e41b37b7847d5ccdaeeffebcb6fd29b0
SHA51256479bb83ef34810e3d84dd8649912a2f9f1bd136dfdd7f0fe1376dcd9dc94aec46f1b8b8a865a7b21f5f61c6846c9951fe526495c9f13da6dd15532ffc4a2ae
-
Filesize
594KB
MD5f58327f22a3fa1a000315a69bfb098b6
SHA1dbfdf8bc890c0f7700bd6f93ace42246a077295b
SHA2568a9f809ac3ffa339dcdf575b9e9674f1ebd52b1db9bdf7313c29bd79bd3b8ffc
SHA512c8508b1c373fd6c395e4083935aa2a25ff25161a594ee66f2c81d5e9b5a620abf8b85bbdf4a7567d014ad2113cc89dd5696b25ee3c1e2990c9f6fff0b986439e
-
Filesize
1KB
MD5c66552b043690bf4360a2232de31ae18
SHA166e4e26b3cc4b8664f6c9885a2cdfd270b0f3779
SHA2563f9ecf8d5aef808ed0cc555bc13089c82b5d75a23127a00ca763c764b152c556
SHA5128bc6fdf4842e6341fc514232704f128a983f69081a1a11cdf5324fe15a63c06d7ec66841e93665d998fefb65871ea8e373caf6bec4f7bf23d8fa4f1c1053005e
-
Filesize
2KB
MD5d6a5ce5b533357d064cbedb79e047f2c
SHA15fa1455954a893d0374d6e0a80f64e2a3dc7fdf1
SHA2560a38f5b462227f9b502643f8ebe08e73b7f5e9e9e48ed030bebf9e9f28c918e3
SHA512a95824950829b19c4f4d11553fe0623d1fca4433e6a2016bdb1ca3afc1a0a387f93d5ddc477efc504006db0d80d8193592669ae890af4655749860f3f73806bf
-
Filesize
2KB
MD59af42f4c5cf8e047bf3b02b28046ab8b
SHA1e17ffe94a10d34314cadeb56a43520dc4dfaf781
SHA2565a040f358016de95950e2b76240ce99dd0e68cbf55f60cfda9064df77cc663e1
SHA51240ef8f6d3502ce35218a83ea5bf560f43da17804e6d211d5422a6f242bf1417849b287e81239171115177ee9ec9f6a237ee4875ee412b3f76ea62f2b5a80815a
-
Filesize
24B
MD58544f56fb43168a8b456e2e4576a5b93
SHA1d034d32322d42168597bff2c4a48e2bad7b81b0e
SHA256112ca800b132ec18bd9f8227d025434bc6864de29e2e62a883e2f526747b8117
SHA512e0c537ce7bba8fb08156da0731c818c327aa4153c43e9b5675c988c8cc246163dddb69ddf32bb5bade527a900103e3420e50e6de66f2b3f2c4a856ecc3226f9d
-
Filesize
8B
MD5d8ad9837c923b19c34e100c53022fcd5
SHA18dc8e935081b245364183ed2cfc5bb58fbbca416
SHA256bd7155466d1084a7844a97bd5a2a63a1e65a6fd54071f2644d0779a32165de1d
SHA512fe2ae1888db0bbd7c195d0f441ac718a121aa061b04a335a65b4f95aba758271f3d9176cdff418fa4a3923fda5cd3672fef18eb98302ac951ebd31527ec1a401
-
Filesize
136KB
MD5a15cb6e3c51e7b9ccf39dc86ff9031e2
SHA145ff89ddcb39167bab2b2aae46afafd8aa99d7d2
SHA256787d475decc8bdd9ee21383470fa39fdde7cc414dfcc63d59aa97c9638c4aa19
SHA512cd4ad6644b103ab839db084c86e7c50fc560b93fe67bac3940f48797fe88d2e31f3d645f90367388d27d79e60f583f34c905e51a4626bac01f74aef7b7e11071
-
Filesize
512B
MD549b171de21dbe490ae88aedd726d918e
SHA126bc2eb195552ee017ecd4fdcd5d376067a7c389
SHA256279e2dff0baeb436952b0ad8356a2dd5f48d98504ffdf86c3d426f18416096b8
SHA51287d148e94f2356fa6f39e36a459f9490dcfe819f85b127d5c34d3ef3e6775b6936d7f825c9ae4bd505b1ad9a0b3ce74b118c6ff98905b78088d6645a2a02900a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5d198654d18d4e76a71e050a49d59cdb6
SHA16f1c6f5a02b87512ee3455d5b62cebdb1f5f96ec
SHA256867d862fa82600b466f00357f18a01b42a1c38a61fd1acf412b0623b2ab7a903
SHA512fc8e8300863fbb03219b27c32a3845a83a2c179e7ef1fea5de72f3d9ea84e1e6b317263aad91510f624bc2f5696da41d90f0a11cb386b07f38b918da3b8923e1
-
Filesize
116KB
MD563b2383e5af2b9a884c44d5f1712eccd
SHA122f91f21a65f73c2bba33e5416d79b798463a974
SHA256e3804b290f39d4bca579f242c15391493adaaa7e6558a98af7ec473a315d5c2a
SHA512c41be2d201c982d2c92df31004315a1c2b0cfc8d0ea649a7b61689dcc3310faef0f4cf5b3f1d2b6b4608436e5253908989a5f2117f8b5f0b8febb2b7cf9b28a7
-
Filesize
422KB
MD58c871f16db8e1bf6d59328ee4ae79a52
SHA18f1a861758dce8292b2dde8b21ce69974ab3fdc8
SHA256682c540d974969d8fc96b34cb71f6f7e01676dc36b87a864202c13778c8c0343
SHA512a1028227032df424a0faac600f97ee5b9daa5e44df4400ef3221857d0428e5a972347441daaaad98f3377d985baf52f40c6797848be86bacaa6c6fddbcb3c3b7
-
Filesize
1006B
MD5bc531b560d9a3db8e44e5718c6947346
SHA11c8e09999bca562936c9bd1cde5ad46c73baa03f
SHA256bd3896dd7e78edea48c71968b21b48539ab10bfd26d4fbb189320d6400c5d0e5
SHA5126eabac1255abfeb9971b153351a79810be083ecad4659bac732ad6e28f2cb50e985f2ed58a108b8c3b94df3c4011cde3beadf77a001577d7bb4968216af81897
-
Filesize
212B
MD50e681972d8725016a802b49a4d9bad77
SHA1bafbe21d393f2e023ccf87baef0510197d48d6f8
SHA25688d12c89beffb2e4ade0d1a68dd7e149dd9cb7ab2496917afe32c81c256430b0
SHA51222112655255bb6c8e6d5bacd3aabd14758fffcfb3a8b40b0e45351a5df243974b3f74432bfef8c2a36ebb450bb34a6afa3a8c40172021288caad7aeb555b2fa1
-
Filesize
1.3MB
MD542c08315b98425e35beaa33f2541d4a0
SHA13ff3d9c63cba1c8b7167ca180f5090230b4ae495
SHA256efbc7f603254dcf9a0e308ab1ec59bc408f7fedd31cf664ac5f462d36fdc597a
SHA512a767e5adc032fa712bf04d65bf4169f485d464be1671a2343b05abb7114acad8faab2eab630426411f42492ede044e653a2ea62c8504d97a0b2396c562d07509
-
Filesize
1.3MB
MD5049076c9aacb482b2684dc3e1d86b810
SHA11649ff79d020fb1befb1bad3f25a2bfaa233ae7b
SHA256d4bfbb868860fdef017ca019b8630f8c5afb2a01b47256f722af99276ad73d15
SHA51228f7ccdd52dbd44f51d52ff19cc08467a9d528894a7d05e0acbb7e869dd2b9e6aa16af6c88f5e65960d166f97390b1bc3b58896d8b0178e06b6854e98e6cf80c