General

  • Target

    11af0da9a7c5f65bb098ed52973e814b12eba492fb3615a5fada5d4cc390928d.apk

  • Size

    8.5MB

  • Sample

    250220-qerccsvqcz

  • MD5

    4ac484f345acdf8890166cbfeaa83768

  • SHA1

    dc2e2796fabb883ca0c78248bb9c04ed1011f3a9

  • SHA256

    11af0da9a7c5f65bb098ed52973e814b12eba492fb3615a5fada5d4cc390928d

  • SHA512

    98baff804466a3b02a9e1b333f58018664369f054cd5ae21869527ba63e0527e1b40e4b4edadd41abb2a34a244f6d49b0b6d827f29fdd6d9b89c63009ae1dd34

  • SSDEEP

    196608:nHEhsSiVt8gibdDYcAIUGVwrAWH5PVc78KSg:nHc/irIDYAUGVgAWH9O78K9

Malware Config

Extracted

Family

trickmo

C2

http://starnow.cn.com/c

Targets

    • Target

      11af0da9a7c5f65bb098ed52973e814b12eba492fb3615a5fada5d4cc390928d.apk

    • Size

      8.5MB

    • MD5

      4ac484f345acdf8890166cbfeaa83768

    • SHA1

      dc2e2796fabb883ca0c78248bb9c04ed1011f3a9

    • SHA256

      11af0da9a7c5f65bb098ed52973e814b12eba492fb3615a5fada5d4cc390928d

    • SHA512

      98baff804466a3b02a9e1b333f58018664369f054cd5ae21869527ba63e0527e1b40e4b4edadd41abb2a34a244f6d49b0b6d827f29fdd6d9b89c63009ae1dd34

    • SSDEEP

      196608:nHEhsSiVt8gibdDYcAIUGVwrAWH5PVc78KSg:nHc/irIDYAUGVgAWH9O78K9

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks