Analysis
-
max time kernel
46s -
max time network
132s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
19-02-2025 11:03
Behavioral task
behavioral1
Sample
ready.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ready.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ready.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
ready.apk
-
Size
696KB
-
MD5
d9f290fb187ef934a1d537a8e4e23d4d
-
SHA1
e8ecb29ca4c3fbcf2c422e38ca5f5f42acbd1267
-
SHA256
ad7edea231a4c057df19d0b552f64437aab5476801bb8d91af1e5fc4b40ddf7d
-
SHA512
42733f2dcb466b381223fee1dea794d2cc67a39ef4afb409d8f0fda8510a1f368e266ba075457306dfe069d799fda246fd09acb24a65fdf2ec9a063b924dfb0f
-
SSDEEP
12288:9QmhJeRll5/MHgvhjiZQNT3+HamhQR5S6Vm+6usT3cgtN0Fd06Rq21YgKZtWDYPI:9QrRllK8+ZQNOhTy6HT3SFd0GNtxYQ
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.appser.verapp -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.appser.verapp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.appser.verapp -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.appser.verapp -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.appser.verapp -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.appser.verapp
Processes
-
com.appser.verapp1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5049
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD53a71cc46a72de9883a7b8fa8cbe34ca1
SHA1ef1bbdb281e546b3628a1a845b4941db1ca9e4a3
SHA256c06d9e99f6ee253432eadfdfac6008e211182c3770fd883fd0ff6e4e08a5e201
SHA512f65df913a1f4ecb920de54fb6c30ec52368e3b61043f9e37656f364d420f97d3a816ef2b0c6d9e770521e3cf1818cf9c5d689482418278b3c967a4d57c9bdf07
-
Filesize
24B
MD519e9022a0237abfcb41de0da45b6cdc8
SHA1cfcb8500f6e281eb42e54dbf472cc05fefdf55ac
SHA2566a3ed19be60f504848d404f19e7c3dc35b0e2d623fab204e02d6aa93acc0c4c3
SHA512bd02400d5f3f91054f1bf60ccc35457d6f3d83fccae18b3fbbe22b81c5fa86e430d2886685a6a7777c5714d25b16499be31ce86097e64d3b878c04d89dd2aec6
-
Filesize
24B
MD58b7b3f50eed2777d6c50bdb3e883519c
SHA1f3f04b5679105f5bd0efc3dda76aa29258ac006f
SHA2563c5f2c9318209bfb1e85b0bc7d92b4c038881913854a4ea1fd7c4fa46cbd0dde
SHA512037435b68e40006b82c78989d7ed7b4751b7026859f62c0c2ba58957638d75be284509b6fd108557fcf452d5696f8e03e32b520d56b37d8f3416a519b6c0dbc4