Analysis
-
max time kernel
149s -
max time network
153s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
21/03/2025, 23:51 UTC
Static task
static1
Behavioral task
behavioral1
Sample
207a4f9076aa04435c532f8d62ff134859abdca31bc0f11fc31aa4f8146ef9a1.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
207a4f9076aa04435c532f8d62ff134859abdca31bc0f11fc31aa4f8146ef9a1.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
207a4f9076aa04435c532f8d62ff134859abdca31bc0f11fc31aa4f8146ef9a1.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
gubuza.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
gubuza.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
gubuza.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
gubuza.apk
-
Size
7.9MB
-
MD5
f90d4de771dcc141e100f811ad918f56
-
SHA1
f3def8d2ec874c94e2eebc3ec707ee4e3ef1efa1
-
SHA256
e35b6b6faa11919f72dd9ea82fc74acd07451da43902c7b137296aa7b4f308d2
-
SHA512
743c07d5ea09cf716dd281a4fec6c2a82f65cba6fd1b3c68f48e841105904811da6a2ae8ef6714497249e6ca85d2a15afff655f4ce1715dbc00a4c6a0b8c4714
-
SSDEEP
98304:71o/Kr5S91kNhqTKr1aB3eUCtofx+sJfhexflKfN2ieSyeTgnrSsa6:I91kNhw+1e7x1Jpexf0UYErSs/
Malware Config
Signatures
-
Antidot
Antidot is an Android banking trojan first seen in May 2024.
-
Antidot family
-
Antidot payload 1 IoCs
resource yara_rule behavioral6/memory/4774-0.dex family_antidot -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.migadesoni.flash/app_rose/FctGwTs.json 4774 com.migadesoni.flash -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.migadesoni.flash Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.migadesoni.flash Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.migadesoni.flash -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.migadesoni.flash -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.migadesoni.flash android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.migadesoni.flash android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.migadesoni.flash -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.migadesoni.flash -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.migadesoni.flash -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.migadesoni.flash -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.migadesoni.flash -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.migadesoni.flash
Processes
-
com.migadesoni.flash1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4774
Network
-
Remote address:1.1.1.1:53Requestwww.youtube.comIN AResponsewww.youtube.comIN CNAMEyoutube-ui.l.google.comyoutube-ui.l.google.comIN A172.217.16.238youtube-ui.l.google.comIN A216.58.212.238youtube-ui.l.google.comIN A142.250.187.238youtube-ui.l.google.comIN A142.250.180.14youtube-ui.l.google.comIN A216.58.212.206youtube-ui.l.google.comIN A142.250.200.46youtube-ui.l.google.comIN A142.250.200.14youtube-ui.l.google.comIN A142.250.187.206youtube-ui.l.google.comIN A216.58.204.78youtube-ui.l.google.comIN A172.217.169.14youtube-ui.l.google.comIN A172.217.169.78youtube-ui.l.google.comIN A142.250.178.14youtube-ui.l.google.comIN A142.250.179.238youtube-ui.l.google.comIN A216.58.201.110
-
Remote address:1.1.1.1:53Requestwww.youtube.comIN A
-
Remote address:1.1.1.1:53Requestmotorspeedhfuier.comIN AResponsemotorspeedhfuier.comIN A89.116.48.242
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN AResponseandroid.apis.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A142.250.179.238
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN A
-
Remote address:1.1.1.1:53Requestandroid.apis.google.comIN AResponseandroid.apis.google.comIN CNAMEclients.l.google.comclients.l.google.comIN A216.58.213.14
-
1.1kB 4.9kB 10 8
-
1.1kB 4.2kB 10 7
-
2.1kB 8.3kB 18 14
-
1.8kB 1.1kB 9 5
-
1.1kB 4.2kB 10 7
-
1.5kB 40 B 2 1
-
4.3kB 7.5kB 17 13
-
1.2kB 4.3kB 11 9
-
2.7kB 5.9kB 13 11
-
128 B 40 B 2 1
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.3kB 9 8
-
1.1kB 4.2kB 10 7
-
1.1kB 4.3kB 9 8
-
1.1kB 4.3kB 10 8
-
1.1kB 4.2kB 9 6
-
1.1kB 4.2kB 9 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.3kB 9 8
-
1.1kB 4.3kB 10 8
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
520 B 10
-
520 B 10
-
520 B 10
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 9 7
-
1.1kB 4.2kB 9 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 9 7
-
1.1kB 4.3kB 10 8
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 9 7
-
1.1kB 4.3kB 10 8
-
1.1kB 4.3kB 10 8
-
1.1kB 4.2kB 10 7
-
1.1kB 4.2kB 10 7
-
135 B 40 B 2 1
-
519 B 7
-
128 B 40 B 2 1
-
1.1kB 4.2kB 10 7
-
3.7kB 11
-
122 B 319 B 2 1
DNS Request
www.youtube.com
DNS Request
www.youtube.com
DNS Response
172.217.16.238216.58.212.238142.250.187.238142.250.180.14216.58.212.206142.250.200.46142.250.200.14142.250.187.206216.58.204.78172.217.169.14172.217.169.78142.250.178.14142.250.179.238216.58.201.110
-
66 B 82 B 1 1
DNS Request
motorspeedhfuier.com
DNS Response
89.116.48.242
-
138 B 109 B 2 1
DNS Request
android.apis.google.com
DNS Request
android.apis.google.com
DNS Response
142.250.179.238
-
69 B 109 B 1 1
DNS Request
android.apis.google.com
DNS Response
216.58.213.14
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
947KB
MD5fa879b2f24acbcc304f6fdd6ccefa08b
SHA1252b7372eef87b0a5849ea504997723a5db4607e
SHA25640cb9837345ef04c974d4f7b7c4c88181a1e1394b7579433ed55776a192abeb7
SHA5129511a08baa4a93d17e7e8f2dee18b1979a93fbc8ada07d85bacf3679dad94d8241c5e9090fcc8e47919aa8a13fd116688139f466899596575ef995d2895fd002
-
Filesize
947KB
MD5e5c64205d7b12e3efa3813cabea19b6d
SHA152b2ab984e2e23e366371149481b0eb4997f93d0
SHA256ebdb530e2f492c160c01b6b5058fe1ea92333edf57dbccda0c8ef3ef4525a3df
SHA512848b37e89bd1b3731379d7337456dd9a378f9e92b8c3a6fcafe0397ad5064c52eee8e0e371bd46cbafe9201aae305d781c617cb8240b7445046666821d41eb28
-
Filesize
3KB
MD50db28dbfeb1729b93b84a2cbac7506ac
SHA160bfea7e0dc3c95d24b75badc1a431d5213a7873
SHA256c7eb8ac193724481ebf6fd8835dae91825b15483db41b58aa5f1a67d2ec3c2f5
SHA512382b6608942a15f10b63ebb7f57508717efad1914aa8e80a54810496d5c47941b1a17007aa35cafb50f6430e8028bd16ede0265ce40f950f5b5e2aa00e7255f5
-
Filesize
8B
MD5db7e531225b4449fc708d14a691f7e9a
SHA1bf5b8022cc89aa99b5effa066403cb12d083cdaf
SHA256391d41343e02fb7b400fffe6a2bf1b6288d758a6fd8685a5eb80332f2bb42c43
SHA512fc4033ba3002f29ce33c6b882798c16b8653e71d9028ef2609cd50e5ecbc64d93af7cbc1187c67e211909f64b5135c102f14f76925bddf179a029094eddb6a89
-
Filesize
104KB
MD535aa3cf99d5d61cf06021163a5bfbd9d
SHA19e3c8cfc802995f320d2ef955bfbdc5e9da57d21
SHA25607a5e803c6b8ef327ae6fca73fcdbfeb8e75e89cffd454ea16f26234627a027c
SHA5124c91f35137e79cdcc4748d1817b40351365caa587cc756f493511bbe262cada225d1cda4157708297629e6b066528215e4d528dea00f46c195ffbec6f6941e73
-
Filesize
512B
MD5ee088f429e96934b4d6db62c734fe897
SHA1ba9dcaf0562fbdb01782da45331fdb6462a4818f
SHA256ee48ac090488d5e6f552d854a904714bf0168ae08e1cb8cfdbc3acb57ee24647
SHA51204fbce0860e435939e10f4e1c6c81d3a8d38f9877051b11d1d31a54b5fdf43f5217bac760219a475a6ab34605a0449042c8b67a12460bc9af615e846f531aecf
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
426KB
MD511fd1a4d830fbcafb0cbfaeb8edc882d
SHA173053dd0656dd3920c7cb6e0523d96fd971a1aaf
SHA2560bb648194ba198aefbc0213118acf14726302d81ba7de64efb1c14e5b0d6bc93
SHA5121e50690ed68a7900b2972bdcb4d0e0aa646a7d41c713e41183afce7c64f6f9a5054a2ecce568429b70d130802d4ca2aa956aad6cd24cd1672b5729df5e363f9a
-
Filesize
16KB
MD5bc49a54fdc06c06521237dca831b2de3
SHA1d3987150bbba932c4f8cac0cfb65bd21ba333e9c
SHA256047caa8990f44d13dfafbed48fcb57574cf4ac58bb55e81b10b8c4c0487f67e5
SHA512c8d46fc85799e1ae76aad129e34d6b0a413cdc2c37f3b1586e7c61844f8ffb06b84b841e2bf790a5f765a89cae4b888f74af3ed15febef3f715e37e72a75f5db
-
Filesize
116KB
MD547a0794f357e74aac3e90e24f4524bea
SHA17d08c9ab75634cc971d68033dfdaaf694a5a4ba9
SHA25658a2a261a53042d419b00e2e1bd63991520567f698029c18400be83d48d7316e
SHA51206752ae3b38760bc2f135385fb35de3ed77a435d7a8958a44a8df947d77beed02ff1bd8650ef7ee938305d3ebebcdb07ebcaa4e3abdad368eb14fe6ba362ba44
-
Filesize
1KB
MD5d7a6934f5661a867ded3903bfd81d470
SHA12efa92fb7cf5d2b9b9ee1f41a98f8cd6756fc774
SHA256b20c6a122f5dca0eac4ca09c28e2f8b3dedd285033a3e3ea7afab8021d94a5b8
SHA5120ab947697eb21060c1be39b776623d5daab92c828662f59e3ef8067cf7c18bf4c2beeaa33b7fd254a6babdad3431631d5b4ae381b6b8647a85fb75b3f6b62968
-
Filesize
181B
MD5ca4633c1fe385f122e9fa992ea8c0cd5
SHA1095b685872d1eb438130aa89fa6dde19ad11b01c
SHA256a6c3a9677ac6c21811cf7cbde98c816884b15d5b32a7fbbe416ea2e2c548fb46
SHA5127bf84108cf7e04df6c8969653796ed4335fd944d25a20e5d98e298bf87c665e77befe3e6e3bcb40cea2f2f015c96acd02eb8582b7e1724cbd73dea5b35cf3d8f
-
Filesize
2.0MB
MD509f1b6d4c8231a009e9f9a1f4ae21344
SHA18cee3e6e6f8f4b5aebd22d4eee254d52df826a60
SHA25630a7079c84ac70df21f93441a1835e1d18c27d4a2cdb69a26fe404c31bdf3918
SHA5124e363b1db3766ecc1e9943ea371e77996cba88d9ab803267e7839fe18c01898ebf0483b8bb1e5cfe4af1f8906d7ad3294c9270e4663d181c4e30a51cd9a90728