Malware Analysis Report

2025-04-03 14:16

Sample ID 250307-l5y3nsytdy
Target b1d2969a39d2e05af42d7b374bb9e7e42902b99eb6db21c468500631d36bfe5a.apk
SHA256 b1d2969a39d2e05af42d7b374bb9e7e42902b99eb6db21c468500631d36bfe5a
Tags
collection credential_access defense_evasion discovery execution impact persistence golddigger
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b1d2969a39d2e05af42d7b374bb9e7e42902b99eb6db21c468500631d36bfe5a

Threat Level: Known bad

The file b1d2969a39d2e05af42d7b374bb9e7e42902b99eb6db21c468500631d36bfe5a.apk was found to be: Known bad.

Malicious Activity Summary

collection credential_access defense_evasion discovery execution impact persistence golddigger

GoldDigger payload

Golddigger family

Queries account information for other applications stored on the device

Queries information about running processes on the device

Makes use of the framework's Accessibility service

Requests dangerous framework permissions

Declares services with permission to bind to the system

Makes use of the framework's foreground persistence service

Queries information about active data network

Declares broadcast receivers with permission to handle system events

Acquires the wake lock

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Schedules tasks to execute at a specified time

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-03-07 10:07

Signatures

GoldDigger payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Golddigger family

golddigger

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by wallpaper services to bind with the system. Allows apps to provide live wallpapers. android.permission.BIND_WALLPAPER N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an app to access location in the background. android.permission.ACCESS_BACKGROUND_LOCATION N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows applications to use exact alarm APIs. android.permission.SCHEDULE_EXACT_ALARM N/A N/A
Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2025-03-07 10:07

Reported

2025-03-07 10:10

Platform

android-x64-arm64-20240910-en

Max time kernel

148s

Max time network

163s

Command Line

com.sextest.test

Signatures

Makes use of the framework's Accessibility service

collection defense_evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

defense_evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.sextest.test

com.sextest.test:mr2_process

com.sextest.test:fore_temp

com.sextest.test:main

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.78:443 tcp
AU 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
AU 1.1.1.1:53 www.youtube.com udp
GB 142.250.187.206:443 www.youtube.com tcp
GB 142.250.187.206:443 www.youtube.com tcp
US 216.239.34.223:443 tcp
AU 1.1.1.1:53 www.baidu.com udp
HK 103.235.46.115:80 www.baidu.com tcp
HK 103.235.46.115:80 www.baidu.com tcp
HK 103.235.46.115:80 www.baidu.com tcp
HK 103.235.46.115:80 www.baidu.com tcp
HK 103.235.46.115:80 www.baidu.com tcp
HK 103.235.46.115:80 www.baidu.com tcp
HK 103.235.46.115:80 www.baidu.com tcp
AU 1.1.1.1:53 ssl.google-analytics.com udp
HK 103.235.46.115:80 www.baidu.com tcp
US 216.239.34.223:443 tcp
GB 142.250.187.200:443 ssl.google-analytics.com tcp
GB 142.250.179.226:443 tcp
GB 172.217.16.226:443 tcp
GB 216.58.204.70:443 tcp
AU 1.1.1.1:53 rpc.ynwxjd.vip udp
HK 43.199.53.198:443 rpc.ynwxjd.vip tcp
HK 43.199.53.198:443 rpc.ynwxjd.vip tcp
GB 142.250.187.193:443 tcp
GB 216.58.204.65:443 tcp

Files

/data/data/com.sextest.test/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.sextest.test/no_backup/androidx.work.workdb-wal

MD5 f443981a5659314863224ac9be3e236c
SHA1 0494678642d7c628c77ecb041210af79f4652720
SHA256 66b2fd6d634397646a277c1d2946248252ebd6285c25a779140eff544940af39
SHA512 acd6532d1f81b3c279afa8b64b6c5e65466823ff21c4d1913675a643b406bbf728a02387cb65649844ecb1e49d8f3e206f7fa2da68334aaa8f3d7157d7437286

/data/data/com.sextest.test/no_backup/androidx.work.workdb

MD5 bfd2999d78a0c330dd9896d76ae78d89
SHA1 43604928b27abf1edc63cd1eb468b55a11346eab
SHA256 b8d03fdc630b108d1be22d429c99772acdb9a26fa50baed87431a58952a92952
SHA512 7b325862ad44ba5ddb9bfdf4d0b4d278beaa100adc3117d294fd02ff8f5ddd8c1673dd1521ae9b67ecc76fb3d1ed7e9706b272021c19b982898752ceabb6508b

Analysis: behavioral3

Detonation Overview

Submitted

2025-03-07 10:07

Reported

2025-03-07 10:10

Platform

android-33-x64-arm64-20240910-en

Max time kernel

148s

Max time network

153s

Command Line

com.sextest.test

Signatures

Makes use of the framework's Accessibility service

collection defense_evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

defense_evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.sextest.test

com.sextest.test:main

com.sextest.test:mr2_process

com.sextest.test:fore_temp

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
AU 1.1.1.1:53 www.baidu.com udp
HK 103.235.46.102:80 www.baidu.com tcp
HK 103.235.46.102:80 www.baidu.com tcp
GB 172.217.169.74:443 tcp
HK 103.235.46.102:80 www.baidu.com tcp
HK 103.235.46.102:80 www.baidu.com tcp
HK 103.235.46.102:80 www.baidu.com tcp
AU 1.1.1.1:53 remoteprovisioning.googleapis.com udp
GB 142.250.187.234:443 remoteprovisioning.googleapis.com tcp
AU 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp
AU 1.1.1.1:53 rcs-acs-tmo-us.jibe.google.com udp
US 216.239.36.155:443 rcs-acs-tmo-us.jibe.google.com tcp
GB 216.58.213.14:443 android.apis.google.com udp
AU 1.1.1.1:53 rpc.ynwxjd.vip udp
HK 43.199.53.198:443 rpc.ynwxjd.vip tcp
HK 43.199.53.198:443 rpc.ynwxjd.vip tcp
GB 216.58.212.228:443 tcp
AU 1.1.1.1:53 www.google.com udp
GB 142.250.178.4:443 www.google.com udp
AU 1.1.1.1:53 www.google.com udp
AU 1.1.1.1:53 www.google.com udp
GB 142.250.178.4:443 www.google.com tcp
GB 216.58.213.6:80 tcp
GB 216.58.212.193:443 tcp
GB 172.217.169.65:443 tcp
GB 172.217.169.65:443 tcp
GB 142.250.187.238:443 tcp
GB 172.217.169.65:443 tcp
GB 172.217.169.65:443 tcp
GB 142.250.200.35:443 tcp
US 216.239.34.36:443 tcp

Files

/data/data/com.sextest.test/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.sextest.test/no_backup/androidx.work.workdb-wal

MD5 e38faa6ca1b68cb13d0cc3a7437749b5
SHA1 6e9a1602cc3be09f60d3e22e3f399faee6fc2199
SHA256 64371197802294e341faa0c4f8531d3d366ef0093974c92127e0f8753f0c3eed
SHA512 34a8810a81f141b2bbdc55a30b6c79e7e2f4c5405b709121b5e7e9d741bf1682d26c39d9ad90973ede6f6bef8f6828d83f6728746c1d3c27c4713134362ddbde

/data/data/com.sextest.test/no_backup/androidx.work.workdb

MD5 aa4d66c8d496f9c44fccba0cd4ef03a1
SHA1 56c3d6d7ffe577012948735e9c17cb8d919b3865
SHA256 51654517fd0e686f7524dc3482ded9f6b6a574d25b14cfe81f1d3c285f589d68
SHA512 80b23ea048780f9fed99232d103e3cf29a33398799a5b608b45697c4475831ae5a9a93b30009d0b80ce2c23d17f1f5f52b0baef524705518023bb5841c93e1a1

Analysis: behavioral4

Detonation Overview

Submitted

2025-03-07 10:07

Reported

2025-03-07 10:10

Platform

android-x86-arm-20240910-en

Max time kernel

145s

Max time network

160s

Command Line

com.sextest.test

Signatures

Makes use of the framework's Accessibility service

collection defense_evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

defense_evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.sextest.test

com.sextest.test:main

com.sextest.test:s1

getprop ro.build.display.id

getprop ro.build.display.id

getprop ro.build.display.id

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
AU 1.1.1.1:53 www.baidu.com udp
HK 103.235.46.102:80 www.baidu.com tcp
HK 103.235.46.102:80 www.baidu.com tcp
GB 142.250.200.46:443 tcp
GB 142.250.200.46:443 tcp
GB 142.250.200.46:443 tcp
AU 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
HK 103.235.46.102:80 www.baidu.com tcp
HK 103.235.46.102:80 www.baidu.com tcp
AU 1.1.1.1:53 rpc.ynwxjd.vip udp
HK 43.199.53.198:443 rpc.ynwxjd.vip tcp
HK 43.199.53.198:443 rpc.ynwxjd.vip tcp
GB 142.250.179.228:80 tcp
GB 216.58.204.67:80 tcp
GB 142.250.179.228:443 tcp

Files

/data/data/com.sextest.test/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.sextest.test/no_backup/androidx.work.workdb-wal

MD5 ec960778df027aa2cee7b7dbb9017ba4
SHA1 f1875fcdcda442c8d89a5884275afe40632810e1
SHA256 06cf1f583082736278b043a2e03b49527fdbeb353d1d4bbc017373c245e39790
SHA512 b7570d1ad81d8ea1696a66b7207aabfc2e3c1645c172b1d1073f402002c1b9aac16c26809a5518fa062e8af25594b04ce12a0de4cb73b6f625ef2e2309567475

/data/data/com.sextest.test/no_backup/androidx.work.workdb

MD5 fc556a23072b11d18015eca6f15e7416
SHA1 82753c32da650790037a3c90c3d0c252efa36a96
SHA256 d13861565593c5f1f2678ef748fd2ba979de709feaa3553c6bbfba19a7b8814a
SHA512 6926b1c474140b0c2f624027da9818f8266ca22f33b09787dc931d0c8b789ce1ea7ea097ab9e0eb7ba80aa36ff2b51cdac38cfa39a382f099dafa29fd2d078c0

Analysis: behavioral1

Detonation Overview

Submitted

2025-03-07 10:07

Reported

2025-03-07 10:08

Platform

android-x64-20240910-en

Max time network

7s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A