Resubmissions
Analysis
-
max time kernel
295s -
max time network
308s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
20/02/2025, 07:34
Behavioral task
behavioral1
Sample
Chínhphủ.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
Chínhphủ.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
Chínhphủ.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
Chínhphủ.apk
Resource
android-x86-arm-20240910-en
General
-
Target
Chínhphủ.apk
-
Size
23.4MB
-
MD5
9b4aaaebca0f904234d371475d3dcc6a
-
SHA1
fdbd2957048a9564a923bda70d68ab292bcb7540
-
SHA256
c6e52bd7d8a1de54e5a6551a7a737c989d93537c1bb440fdf37914c799e77f16
-
SHA512
d8ad4d4d10747264e2ef960dcef5e70049ca7eab102fbd02ea07982e01b6af2130f95856694a9ebe0f3bcc3e2512a8bca92f944b1b5aa9f54a0cf5e34ecd67cd
-
SSDEEP
393216:HehX6Cksss3FNgIuc9zhL9XmENEuEyIlRrU:+hXedsFitchHXT+U
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 5 IoCs
ioc Process /sbin/su com.cam321f.mac /data/local/xbin/su com.cam321f.mac /data/local/bin/su com.cam321f.mac /data/local/su com.cam321f.mac /system/xbin/su com.cam321f.mac -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /system_ext/framework/androidx.window.sidecar.jar 4446 com.cam321f.mac /system_ext/framework/androidx.window.sidecar.jar 4446 com.cam321f.mac /system_ext/framework/androidx.window.sidecar.jar 4670 com.cam321f.mac:remote /system_ext/framework/androidx.window.sidecar.jar 4670 com.cam321f.mac:remote -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cam321f.mac -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.cam321f.mac -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.cam321f.mac -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/data/phones com.cam321f.mac -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ com.cam321f.mac -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 43 raw.githubusercontent.com 44 raw.githubusercontent.com -
Makes use of the framework's foreground persistence service 1 TTPs 2 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.cam321f.mac Framework service call android.app.IActivityManager.setServiceForeground com.cam321f.mac:remote -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cam321f.mac android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cam321f.mac -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cam321f.mac -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.cam321f.mac -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.cam321f.mac -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.cam321f.mac -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.cam321f.mac
Processes
-
com.cam321f.mac1⤵
- Checks if the Android device is rooted.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Reads the contacts stored on the device.
- Reads the content of the SMS messages.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4446
-
com.cam321f.mac:remote1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's foreground persistence service
PID:4670
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
3System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD56ef71c44538f61c1e8aede1a826047a8
SHA1e005f1a8d3112b95513dbe9bf5823b8875184364
SHA2563c4ce61f435be6b5ca743e63e2858c2a23c06847a3574f47799d7716be2dec45
SHA5129ced71b78b20412a2a6a5ba4eff5ca8b6d64a97e9a356ca8c8bf7a2aa0564328ceb2ee7ea37ffd9811292b438154bde70d771fd548b9a5bc1cd9a01de1553a69
-
Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
Filesize
143KB
MD5e1c1cab680423d4dc5dc0d0e19a9c7e3
SHA1448b0be9efa34d026bcadde00fa73a8bdb9e61d3
SHA2561e02b2561a6eb7c5cb2f97a28ad15cbcd47488d5a47f5bfcd21038e5361aeb5d
SHA512ad41acc422535807026b089e9bc45c2342248e7b76d5dae3c2c138301862a63bb6b486f5e8e5009e05542e29d3a04deee5861fbe74908bda4029ab732f184b8f
-
Filesize
60KB
MD564ec1f78c63299c74030262a857fb0da
SHA1793e62553f1b56a5b430ca08f5f9d7380aca9a4a
SHA2564372f0d3cc0e19fa2b8b0bd0f376f4c9b79f21ea6cd7cd44a1242d5a9aac340e
SHA512c7aa3960362b57ee39b3c7640cc7e094c404577902f5d62a288c6a5356ff36bb3880773387cd48d8a2bf8330a60c88fc5ff2a80ef4633f2f8cc89cd2b72233f1
-
Filesize
8KB
MD5134235093e652b932319b8cccd751c11
SHA1b3534957ad10fc9cc55e270e130768cdeada3ecf
SHA2564e2c29e07200f060642ae14691c6e88b477bef67a07d6e449d922e7804cd4c23
SHA5128d2090caed0d51d5c29a98c3079c421654e257ecd85a15f1b7bc3416cc891c6c6ba5cb8281672ed52ce871be6ab6a7e8202c5f0adc29f71c99e21fef91017fe8
-
Filesize
8KB
MD5a047a4b1076583413d19526e1e106e5e
SHA1f5f4fd323efecd7b418c534b475d87cf1f731d61
SHA25604aa9d45e7afc356630e27a2665b0737d9a118d368025c5ad9a82db23475f8b5
SHA5120e22523ca29dc1c4e497179f9465f8fdb3f8f9b318a47d4a99606a5312d06b566029b0a5759434316afe56a75e8ace6b049cd63e9a78e1a8117cfa8b31e2d1fa
-
Filesize
8KB
MD5f9f97f3ce2a4f301e5fa4247eea23385
SHA1002ae83159b2ebd4686fe38d9845fd78c51f6ecf
SHA256eee1f12c076e683a951a470781293409bcca69f7e3445ae4ec140173fb92d1ee
SHA5125e86eef064624e3d4e1cf47885c982949ae0fe791ed630d3b5ec92ba3381c3d04ed504ecd81464ff299bc10bf7ae50ba97e8f83bf7fd15b58aa7acb6d99d6ad6
-
Filesize
8KB
MD532eff8df4e0317a64200caf68bbcb969
SHA19765f9ceed074b271526bf928136abfcb89d61e2
SHA25629471db8e570f43406c56e0b348a4e1a03f9cbcf6e0f5e26e24fedcbd6c69f1b
SHA5125674cfcd16074eed0a6e3e00b42f7dbe505e49c8d8274001811821fb9247add7ed42e3419f2beb0859e823b8c99fa6d66407f0c8491713ae556c1b8baa86f940
-
Filesize
512B
MD5c71082960c4fea293643bcffa6b0bf65
SHA1c9a6cc94fcec4574e4d55c93c305f1f6f8702fdc
SHA25658affeaadef9174e330b65e2a9a4206b2266fbe2430591883c550153c423bed5
SHA5123a6d513d40b42619a6f35f7eaf23dc45100bd8afc9e90ba311b723b717e9655c52d0a19e686c7d57f467af1f9dd0db1a478a44083b23dc91413515c8e0476fe5
-
Filesize
8KB
MD585dd64fc78ed34686c853eae381d4059
SHA1c6a48c7dced086010b15a971f605850a46f1eaaa
SHA256ee7bf0d629c4fd0ffdbd41016eb0beedd96e2ad1939aff2a521301247f0091bd
SHA512266af33846757aa7df21e97f5b8cf3b4eca231a30829ceac32c258ac0713504af78373efe329c7b043f578475e35e6b0ec1f224f7532fe2815c39f2704fca0b1
-
Filesize
13B
MD58b4e210c8c36d683389dab9222608811
SHA104ba923a4e853d387093d364e11261d74c67b2b3
SHA25600ee972b178959314e66e6bdfdcbbfa6e43d0fab1466efa99c3c8264d58b1644
SHA51292ed216672650b8b0c547953321b9b1c13a275e1e07c949f0ba7ab96a7b42e78f723cd4e1c4884d36219ba2f7a76cd3ca3b2e0845304571faae414ccda6a7af6
-
Filesize
8B
MD502eea56ffaef06c9cbb731f6c611715d
SHA1ff1672f65650646d639e9227b4ce42515225646d
SHA2561912b3ab6e7a0399088ee7f893cc28fb7ddd5f5af2a425bea088c085229c07d5
SHA512cc5de59543fd7d1bf89a7e01613f7aefd6ea817ce1e56bfe88fc7b6b2e10f81730d8122eb20583cec96a0d6e308b692c2694623f9f0fa8049a183e538045c26d
-
Filesize
1KB
MD5027bf4950972c394dab576e3f799c8f2
SHA15933accf7e2152da750868aba364d5c84ab25ab5
SHA256d000a751679b0cd000fb6e0356d51292b3c14a5845e0392984c92ebd6d826f36
SHA512b3dce7b6178c50c37d373b64d9bcd781627d71cebac3276e88fb15754442ddb4ebd7ae5c698ca8a01e0414a5685bec4d1720682efa88514daed05068bdf10551
-
Filesize
11KB
MD51de19a7fe24ad42757b4d41dd07bd46f
SHA1532452f6d01c293681fab7dd265d3894a88ea60b
SHA25694a04adc35a33322eca088ad593ae64ce86b2d73dc225ba0e7c117a22e9f8f4e
SHA512dc387448f9765d74bd32a9bf721bf96c7eabc3fb999d82f133d3d24641ebe07d8b606f1b69c7321ea6198d0996f02f2970e2146622f382539213d8392c3ae57a
-
Filesize
12KB
MD5bdf3529e80318eb14e53a5bf3720c10d
SHA125c9ace4b1af6e80ebb2572345972c56505969ba
SHA256bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b
SHA51248b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b