Analysis
-
max time kernel
149s -
max time network
148s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
21/03/2025, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
353e47a046b3af6212f98844b18a2ae79963cb8d2b98eb6bd5184296299ec372.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
353e47a046b3af6212f98844b18a2ae79963cb8d2b98eb6bd5184296299ec372.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
353e47a046b3af6212f98844b18a2ae79963cb8d2b98eb6bd5184296299ec372.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
deper.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
deper.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
deper.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
deper.apk
-
Size
8.1MB
-
MD5
720c616bd3e4f7fadde344194a5cd7a4
-
SHA1
001fea85badda450146082038c6a5ce8b9878fd2
-
SHA256
42009a836376a2ca77ca8fc1dad73eca3634df7b6c5ac2091ee0ea53661dd725
-
SHA512
282e2a9256318201caeeff668f4fcd1e93bae0b63d708ac99fb267369299b4b128338b727d55f2d7ef3460295b75e3be0dbd0710beca4c3d5bfdc9bc166ffd3e
-
SSDEEP
196608:lyiCDijCX0oAES/KCmxU7UBnBsXmpF56Wf2GGUTx:q6dE8KRgUFBs2pF5bYUTx
Malware Config
Extracted
trickmo
http://mikejprdanorg.com/c
Signatures
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json 5255 landtual.pomf70.ta /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json!classes2.dex 5255 landtual.pomf70.ta /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json!classes3.dex 5255 landtual.pomf70.ta /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json!classes4.dex 5255 landtual.pomf70.ta -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId landtual.pomf70.ta -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener landtual.pomf70.ta -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone landtual.pomf70.ta -
Reads information about phone network operator. 1 TTPs
-
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener landtual.pomf70.ta -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver landtual.pomf70.ta -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule landtual.pomf70.ta -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal landtual.pomf70.ta -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo landtual.pomf70.ta -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo landtual.pomf70.ta
Processes
-
landtual.pomf70.ta1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Listens for changes in the sensor environment (might be used to detect emulation)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5255
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD57eda39fb990a24bac58f5d6e955ee667
SHA1e90608e181ac701ddf0b7898a588a4788d62a2f3
SHA256e1ac88df0be2b14ff34eab4e9150fcb075987e47cc3bc8b4660d5c7e43f5b328
SHA512ce741115cc895767eba73712ca5bc82416cd16226a666611a623f1b4c876d19472c01289842ecaf74528763b8d8a61149fcca67da138b31cf42cf99b1ae5dee4
-
Filesize
4.9MB
MD573b51fb51a7c1838642325dd9aa03732
SHA1f1963286c4e4fae80593fa5555613bfce95c9f51
SHA256a612724a99d62d5bce2470e91cb7d114ff90dea5c722fad0559eb3ab310b80cb
SHA512c0d2201da10c0817b608c881263557432c88864fb97c5ce67d2d7ab7a257f3f7ca979555eaac33322c96e09f08ea1ed002c0ada0f624864ae01c7dd37f5141cf
-
Filesize
17KB
MD5d780f836fe54e51872bf31220a4dcb77
SHA15136aa7fe35fb70c9bf0ab00bbe7f79cf65705ae
SHA25632abf05fd8eb1edb10fd93e2c0bd9b308d109e5686c06b39f4d173847a0efe17
SHA51262842bd62ea2f1a71880415d84501bc2cde8eb857d4baec4e357f3c4c4a74d2d0418bfcc6431789cce207d5290ceb4b1fee31f206ac527a8727176523c0bc635
-
Filesize
20KB
MD593e7f88ba7fd4f0152e8e5dc56f1acc0
SHA1f29883585567a32fe4d487e5df14173c39c09e65
SHA256dc6bc98e7f294d8994b3120cb87c0ed1d998e559daab810a68323a8968c60c2c
SHA512be40cb85f75181627e2e4f7fb01e371ad4ce5051416d7e931ae45479a1357526e89a017aa461de03076c0b650eb5c851c239e88556677e859bb9b7c28e48d745
-
Filesize
20KB
MD592c196e7e2a0eddc8dbb1d9c6f4f659a
SHA1c628b541483fdbd51c4a655cb527c3aae795697f
SHA25660bd9038c145fd5f2f6cf2fee4977c035c621a423e9000ef671d34785af2af72
SHA512006e240e9c3a711b6705e7d0e9a87b931e23963244b6c6d8494692a21d5faafcd37b155d1eda9f4664abc10351d84fa564e64ccc2d808d1cb6a73ad8b8e7ba7d
-
Filesize
512B
MD5bd6e68f9aeb1c7a025aa14a3184204c0
SHA10a3ba1c221082dc5e1b60d9f4919021ff2750916
SHA256c8dcec77313b3b8afa90de090f87600eda9151b6accb91388d2937d8d14edc4f
SHA51263f8ced50cd35c1467bdf729b9be90efd44347c96b3f9fec9b829e7a7587da0ba22d2556ae30ef18064a450d33c7fe6df61dab9c8cb743e0919f4cdd7b3f40a8
-
Filesize
8KB
MD59b0846e26b680ddaaeaab6fdf8317a5b
SHA100c1fee6cee57a4be94690174d8f325bae175ed2
SHA25605594dee1ce88cc012c84449503b4902eddf3ce6f56496009ff70058d3628e97
SHA51210a1c771b770670114b36bcf9c75f178d25c306fd7ac33146a487328cf75a821d5f96cf4aec6d133ac8aa8d618d77494cf40a01e1e538b2959aef708fbce77b5
-
Filesize
8KB
MD5bba8ec9116bd2836ae8fd4b9f524775e
SHA13b3872bccfc626000ae903eb344619d483ba6ee0
SHA256254d74d6d4e263e0d208f4ca6306f364a245515b9dbd87f21f33c4fbfd46b1c0
SHA512966c72a6dd10e658921d7b272e68347c93bf5c3e60e2110126e7a0254f781da074e2501263ea7bf2d7490e94ac65258082c7393a7d1ec783118cd6be31647a35
-
Filesize
12KB
MD5c4fd4d69b478136038a27e6cf3188f6b
SHA167857fd22486a13756ffffe3ffe5ae756d391191
SHA256ec0c9790f35489f4387edad4e7f6527fae2ebfbf2640d15eb1bbe3a84b3428aa
SHA5121d9e68c7c6fb4a1ca6069907b63d0bdc09273345447628b2a9ddb3c055c44215a145132e3aa73a0509082a9d29312a7efe9856c1aa70983666bc7d7d7c057e5d
-
Filesize
256B
MD50afa94a41c25ea2abbfd1aa0bb6c1529
SHA118be2b5326fcd69201d7cd7269d60e14ed2c639a
SHA2569a4539652ac960278b04f1502cc5d6c1675c6803f74b96155e7a26725d91bf2f
SHA5122d3cede32104ad5cc1d942e03fb15900295de7bb92dafb290eb1a39fc0471e83c2495abe6c8cf666333144786023faa38bc2e4915167654e23a172dba904d69a
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a9c44cad8cadf535b654a943a406c1b6
SHA125d678e79501cf4f1451bf25fcdf1b6a3b35dbbd
SHA256cfa313033fb936ed07ee791535765b5bfb2de9e67b4a595179366cf44c5d0713
SHA5124d9204103e0a8694637ba3cb373bea508f3e69db6d0152ffe058b0cd086088a1a159bbfee23ba0e2e4fcc791123d48c0185c13c2c82310dc5864b2854e36bbd2
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
173KB
MD5598a0e48b695ff03c52fff85c9120c7c
SHA19b1d9e39965a30c10c465eec437f0fe323f16a00
SHA256b91788e994fff4af2b10ce913fbb384860f0fb7c3f2525ff379fa00837c7312e
SHA512391cd050047ff9c2ccf2cc6cd7c5bc6426f7c8b541c94cd154c497211850563d80218786d34e5d813861fc742cc9777e396a5b0395a9e9aae9f83e62a917a647
-
Filesize
16KB
MD5ffd27fe067554088063f9261de0ea46c
SHA1984c98e97930315ff355c3eca71bd9cacbb5f7d5
SHA256032ca717727fad891ce936d433fd27f3da561346460d4876a77af4a17d2a545c
SHA5124c8e4affdc467fc8bc698704eef371850a8babed6757f1ad98a3419b15fd194f4bf5b40f08b3d5e41e8c2b947279f92e9a220dc17a1ed5ff7e6f6f484b9a75e1
-
Filesize
108KB
MD5231234ea9330f534b3a28d002de9cbe0
SHA10ec8aa91f492d5ae0062859e24f86e10afe7ec4e
SHA256ecc3fc4af350b94304cc76af119d4fb752e00411afcbf208ad8556822751df8f
SHA512ef8c6ecd9cadf1ad8abd4ea878a69eaecbfa4293786bdce2ff2029a26a74b543233888be7f0d503144cd009b46b6959a9d7bbb58fa5353bc395284b82b44d279
-
Filesize
10.9MB
MD535d4cda95e19e9be467673c78e1e2fa2
SHA13868d4dda794c360f57ba650c332b39ce5c68d8e
SHA2566c84643bdddc36a15b515e72e8b768ba64ff6b8966492db9bce6660934f09746
SHA512577272d92633303f248c8545b67a5205489623ce44d746fcdc906ca29c0cdb26f83140f013510c356b709ead230da79fdd8b04654370a2c18275a3ac98344dd7
-
Filesize
308KB
MD57f553f50925945c7d7138227ae983377
SHA1d7d3afcd10dd4e03daefa0e8e242c1a7b77a7162
SHA25610d07387bd954b877c1d1205814d36bf526108b16f8fc55fe48398d350166637
SHA5122202dad0a09b8359f4b07f2f5da2777f4d3a70931825440da3d4bb13639b981917616f6fe394dc093aab044bd6ec7e47e363d2665b47aea21a0540008083ec1b
-
Filesize
265KB
MD59be81be1b34d2c5b45f8ca690fbcdfb6
SHA110300ac02fd9b57f4de8edda3f68ccc1bfab9e6f
SHA256a9081622945a79c3a4209e8d84c8cdeeb30a6b4ac5e8c4c80703d04fd1841b04
SHA5126969fd501aedfce16d2f1d3c2381765687f8f978072a7fa81ead3e1d9e5dec3cf98bcf6403fec47772fd01d137232fd645deddf8c7d640af887f896c2087658d
-
Filesize
1.7MB
MD530465152db261852e3a226a666ec4304
SHA1442a188e07db85653022734d0a8537d4312aef38
SHA256c79795ea1d8f93d6471a6a10ae92f079fa7c79b0736de04edb53c5c5ae4862e4
SHA5123b9b75f7030fa9280130172a7b1f17766b3399270ec49b899d7f4223e68ce7ee728a0ccd5217b98d276da8f84968f4d436b4e61c7fcd378c3be0a57f906dfa63
-
Filesize
83B
MD5dda1b06f8f9981cb7ae21ee8a239f3e3
SHA1e10f4d4e40ba8618336c70526edcbcc3922e703c
SHA25686c76a087ecd9fe50afdec0db7b16709bce83843fe078626a15899793fdc9f39
SHA5124b08d043257349bd9a451c9e8e4525a0bb4c64a0a1c40ed2f1db530f47c3b04d21e4b1795c9c7cb9fa01aa63bd4d543eb64f1ec2d6806ed15d2da07cafaf6643
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-39.txt
Filesize1001B
MD51c56b419f043be564ccf85c040ba4758
SHA128c97c81599d098b2034aa18abfc72c6c26ea956
SHA256e37f82553044557524cb0b7d2de8623384e03ba01d61cf1de79b2335577c00e5
SHA512ccdc36a1535485c1b62c64ed3ab1f1ae630494e4590506147468bbf0cddd5f5aad538a576a124da28637cd6e138c25ef91433d048ae8422b0d40772d6ae6fd24
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-39.txt
Filesize51KB
MD51a3f7b01d2564add921aa060cf450881
SHA1a8958aa45a6f896874b8cce373287ad17bf51f39
SHA25637dab1bfaac6f240c762ff348d355bb17bb59d7aa8b98255f75a85297e9dca5c
SHA5121d7b2da8ee8a45a49dcfc2f99148353554ba43113d5c4b0a3c0bedecaefac95c6b35c96d8a87d1a6189878ba80afcf99fdfef222a9cee8ad945fc946ef9744c9
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-39.txt
Filesize102KB
MD59dfc9c9cc28cd5dbdd90b02eeb4a050c
SHA12720e028e69cda7087320d287c18c001be211f9c
SHA25672dc70eb716f2f51ddca1b7eecc82074cad2c7b67623c78f0e4315e2ee5c397d
SHA5122a0b1a7f09769212027d59d9e1561455f851d87ea21cf527bed3c3a1e8054772a8e8a4258b417180f97974c8c3768e73a0c0e80cb4ca87890b0f4c842deae710
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-39.txt.zip
Filesize3KB
MD56704d622f9112e088a9b16b10b00e07f
SHA16d93b2e270a73c982970c95355ab1dffe01d8fbc
SHA256e153041000a2e4192a375268ee2effa4d1ccc344a8b851998d53a08b470b87a1
SHA512d32493edff28ebc0475c23f65934af4579ac540b6d61a6e2a3aa981bac1800c81beab31cf3489934893a12c2e4d4e720ab8629162e3e50ba24fe91b2af1a5717