Analysis
-
max time kernel
25s -
max time network
28s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
21/03/2025, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
f5fdc1672088ee29affc4817986e722765c4f03af4dcde8fc603b25544bae62d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
f5fdc1672088ee29affc4817986e722765c4f03af4dcde8fc603b25544bae62d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
f5fdc1672088ee29affc4817986e722765c4f03af4dcde8fc603b25544bae62d.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
wibemuse.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
wibemuse.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
wibemuse.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
wibemuse.apk
-
Size
10.4MB
-
MD5
8e03e90022214eda8f01ce735d8fe972
-
SHA1
0a5fb8dba68751a01aaa113f92b2db9225dd24a2
-
SHA256
5acb5ebdd0e4c8fbafb44a88e66e741f1c94a72e3f07f5adc454687010634848
-
SHA512
40f1415f69ef72ba6ec53745c2192cea7a82e4d1c028cdf0b636af163a0246a3d201d67ddb60f8552733239ebac82673bac179de179cc78656b9d9cef1e2fde8
-
SSDEEP
196608:mB12mtwTYrqOBcjvLDxLB5WLDDKfYErSssdkpxHaNhJ/Ds:mBxmOBcjvLDxL2DKFrSuVaNbs
Malware Config
Signatures
-
Antidot
Antidot is an Android banking trojan first seen in May 2024.
-
Antidot family
-
Antidot payload 1 IoCs
resource yara_rule behavioral6/memory/4775-0.dex family_antidot -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.belasaba.guard/app_sense/LyBDIN.json 4775 com.belasaba.guard -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.belasaba.guard Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.belasaba.guard Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.belasaba.guard -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.belasaba.guard -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.belasaba.guard android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.belasaba.guard android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.belasaba.guard -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.belasaba.guard -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.belasaba.guard -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.belasaba.guard -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.belasaba.guard -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.belasaba.guard
Processes
-
com.belasaba.guard1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4775
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
945KB
MD5211771a5071821646415d372d9df992b
SHA188cc9303bfc9f1c4684d9052a82f6887a9e32d31
SHA25605b15fb490d264ffb6708d3ca6c95b5eddf1a5cdbbf58c8320dddf549db49cd0
SHA5129b1b89dc1dfc810b4e3d05d384971c614c4ff0e020cb7d5a85da46efc88655d8592bdb18cc8bd5a91073fd456969c63ec55c5f7d1528737bec000eb67fbd7dd5
-
Filesize
945KB
MD56083abc4cd5e5452335f2d97cbdca967
SHA11995692c5fe9a01fdb4c9dfef8b4cd4fe8276a90
SHA256394bfc698a39070118f178e3c11e24d78c0f4ec3e6a3e02f32929402933482c5
SHA512f067518fa5d5d4ff8a9e253e32e16664d52ba09e4aeeaac5410fc09d5ccd4e2443ce35112e72fd49e900171b43c9d90b8cc696223f76ea6858be4fd547bfc1dc
-
Filesize
8B
MD5727218a7a09b70855603fd5a8e9381e1
SHA182bcacdec816b4dc349ba0fc9260cce84d8142bf
SHA2563bdc59f8822d2cab54df923b89a810165249966e32405a4e165e2540ec2368ed
SHA5122259969a9229ed28bf6ec4009809708b71ecb483391b85df8718b1cf8099cb9f8cfe21405d5a923e08e11b31de458da3ce81ddea9e0e978ea750236838cc0fa2
-
Filesize
104KB
MD590936f11e05f8b0f7db5dd73dafd334e
SHA1a0b035a9f65f023ef9d908dc373d30ba768079d1
SHA2560d9163418a1a969b8eb97a2ce3181a01d71d1d09e7f43adf713dc09d21bc972b
SHA512735a447a3c797f1dc2f9af1e9d007c83f3d1ce4359bdbe3e5872293da7838f2fd158e88d1abd7d6a3046fd5bc5e2e4f1eebd0f864a8a2f94754402b13c1c5423
-
Filesize
512B
MD51809abb41ed2b1c89a71721b0478851a
SHA1767bbd9e6fd2cafb2992c942d3a2a41c95bc6ff6
SHA2562d824d884a4a0f472d25d101b5e037fc33334398f8518cb5c3b132253c018138
SHA5126a47d83f8b9e6e29dda2e623319f4fcb55898f41bff85f5f22ad71c6ac5c869b27c2fff64a3020ef0042ae2e76fafc39613cd49ba1466396cfebe82f1b131560
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
426KB
MD5b5aceef6b2fc3545df3c4398fe1e7266
SHA171ac5e4927b11b852d402b17f2857d8b78459d58
SHA256590468ada1a55adc9d079f50e63d43365c0fa430f074d60ac7a9c92f0016d11d
SHA51236c089543b54dff5c303af8bc613f946428c9a25991f0c7a4bf81bf0532445996955ffc6eaaa097e93807676676301562a33885386c54c76ba1687987d8a969c
-
Filesize
16KB
MD5f42f1b1846f13872c930f16c5ff3914c
SHA19f6d3870d1040a8b092191f0db1e6a02dbcfd05d
SHA256aa4cb98be911a50bbe41688a155c66b91fe7bb5250bdbbec35e14db2245e3acd
SHA512334ef1ad282082142063854edeacbcd8396c4ffa6c5901bec54be0189d34a835e5727dfa358ef5dc10c0bd8df13784c08b84e2a9165159c141c57327a3717755
-
Filesize
116KB
MD5727f3e018f289c2e2851f0eb248ce3e3
SHA1e5a344aff82b6cdf600356383caf3c8d0b13886d
SHA2560f2779f4a48917a286a90380525b275fe2c140eb9e4b757193ef32021771d2cc
SHA5124d91210fa9d73199abeedcf93960e99ed24b317a531246f74a25df5cf920ac1f844fe904c3a7ec190db3dccdd33707516ea91e1333e70bfe4cbac4cc796e8dc7
-
Filesize
1KB
MD555020e8f639d39ea05fd432ff0e490ec
SHA1e363b94d622814c2ad9296ef518cf73b9aa0d526
SHA25634d8f04da6b2a8e397efe6ea01f1f466b716c1c6f14770a86f0493d96226ee5b
SHA512109ba08189331c1cc172eca777b17b7b51465abb4b5c2bda371b4de11261e8be64321066c459b866c1437d637bd06596f2e860051daecc316995810173f9e593
-
Filesize
2.0MB
MD514729c3618a03cf849b664361086962b
SHA15d2065692e55e6340826b4670e93743fe4ebf49f
SHA256bdaa4680b58d117f7cb4e4ed89a61119e0cacd5c6bd375af912d2bac4c83fc14
SHA5120cb89089293565ce3b89476395be51cfc4103f69aa76671e7f3af4e1abc705d437dd4dfcd81d60c94b3ed4ddfe8c3296dfe7a6972267934a7a1109b9d81f4afb