Analysis
-
max time kernel
6s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
24/02/2025, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
TikTok18.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
TikTok18.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
TikTok18.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
deper.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
deper.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
deper.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
deper.apk
-
Size
7.0MB
-
MD5
29759b117a6ecbb109eb13b61eacc875
-
SHA1
e43ca6077982d51cac30cd400c667e9f49265945
-
SHA256
b35d3b94968603813ae26c35442b7d254c4d670aa299cb7439f083d46ff50bc9
-
SHA512
a21c4265b91fecc60886c3ebe48c47dd15890b6f451e4450e3ba2cc8ba595b3d2f4d8ef4864883d41cef65217f44e2d6a5d34df4bba69832ff77e0413673c0be
-
SSDEEP
196608:WJnJLjXIH/aMTuMkqM6rwii11a6mOt9XkRsCA/gex:EJv2aMT4qM0wiG15mOfis94ex
Malware Config
Extracted
trickmo
http://regtoyou.com/amvgaghabjvlamkmms
Signatures
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/anen.perd715.lia/app_south/oT.json 4922 anen.perd715.lia /data/user/0/anen.perd715.lia/app_south/oT.json!classes2.dex 4922 anen.perd715.lia /data/user/0/anen.perd715.lia/app_south/oT.json!classes3.dex 4922 anen.perd715.lia /data/user/0/anen.perd715.lia/app_south/oT.json!classes4.dex 4922 anen.perd715.lia
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5df041a8b4b8be53cfcc72536c6d96a92
SHA1489c40b44337ec4734e6cb9c90b82e62725f8ef2
SHA25637ddcf18c9c2b6f9985027831046eee204c33e2ecb629d4495acfdd95b0497c6
SHA5124600203722bd25cbef3a9f3810230f9f57ff54cf424c773ea433d11a489d875a0367b8ed724a03a5731e41a3fb62badc6b4bc9d1a96cf2a61395aa76627db1ac
-
Filesize
4.9MB
MD55689572b41191ff3f4bfc5b9bdd86733
SHA121f9eb38562b198ef29663f900c1fe092b535b0e
SHA25649bff12769e22bbfe99d4a369ab3b7e20ed2b7b6783a1585c2bb551b28e202e8
SHA51294a058a2d53f5ba59317eac25bb295b12ad4159f484322cef203dd4413a5b474bfee5536e4a9e185484d76a6ad4ac5bd51b12656dc77f3846eb7427179a1a2ab
-
Filesize
10.9MB
MD535d4cda95e19e9be467673c78e1e2fa2
SHA13868d4dda794c360f57ba650c332b39ce5c68d8e
SHA2566c84643bdddc36a15b515e72e8b768ba64ff6b8966492db9bce6660934f09746
SHA512577272d92633303f248c8545b67a5205489623ce44d746fcdc906ca29c0cdb26f83140f013510c356b709ead230da79fdd8b04654370a2c18275a3ac98344dd7
-
Filesize
308KB
MD55e8b8d85e4b5abf31857c6618050164e
SHA1e9c800a10f757e519187af91dc443734a1d538f5
SHA2566f8a442a4a28ce83261fd78fb45cf3d1e129b5055fb15f55b07135e9dbf326b8
SHA512ba5eb4209cad4d7208df6508b6f895bc17afcea33bb61fcfbfb273a68bf6ba2caab7bf022882f609de826efaceb8ae2cbdb3cc900c6ed9dd2616ec18b8d239a0
-
Filesize
265KB
MD5f8d81c318c06e43a94f0c0408dcfa62b
SHA1fba0a337aa78cbc76d4dc67d39afb6008d512f8b
SHA25657f3c23be7d15bc7593643e92a13aa631bc86d60a29939d3c04370059287c616
SHA5125421d7bee46dbfa37d886f8baf16822536cc46236034575d3f93d25687c57c116403244eb294f44212df2b1436ca9129f9d743626fa02d12f90ba6195a61d97a
-
Filesize
1.7MB
MD530465152db261852e3a226a666ec4304
SHA1442a188e07db85653022734d0a8537d4312aef38
SHA256c79795ea1d8f93d6471a6a10ae92f079fa7c79b0736de04edb53c5c5ae4862e4
SHA5123b9b75f7030fa9280130172a7b1f17766b3399270ec49b899d7f4223e68ce7ee728a0ccd5217b98d276da8f84968f4d436b4e61c7fcd378c3be0a57f906dfa63