Analysis
-
max time kernel
149s -
max time network
154s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
21/03/2025, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
353e47a046b3af6212f98844b18a2ae79963cb8d2b98eb6bd5184296299ec372.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
353e47a046b3af6212f98844b18a2ae79963cb8d2b98eb6bd5184296299ec372.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
353e47a046b3af6212f98844b18a2ae79963cb8d2b98eb6bd5184296299ec372.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
deper.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
deper.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
deper.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
deper.apk
-
Size
8.1MB
-
MD5
720c616bd3e4f7fadde344194a5cd7a4
-
SHA1
001fea85badda450146082038c6a5ce8b9878fd2
-
SHA256
42009a836376a2ca77ca8fc1dad73eca3634df7b6c5ac2091ee0ea53661dd725
-
SHA512
282e2a9256318201caeeff668f4fcd1e93bae0b63d708ac99fb267369299b4b128338b727d55f2d7ef3460295b75e3be0dbd0710beca4c3d5bfdc9bc166ffd3e
-
SSDEEP
196608:lyiCDijCX0oAES/KCmxU7UBnBsXmpF56Wf2GGUTx:q6dE8KRgUFBs2pF5bYUTx
Malware Config
Extracted
trickmo
http://mikejprdanorg.com/c
Signatures
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json 4799 landtual.pomf70.ta /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json!classes2.dex 4799 landtual.pomf70.ta /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json!classes3.dex 4799 landtual.pomf70.ta /data/user/0/landtual.pomf70.ta/app_suggest/EdZ.json!classes4.dex 4799 landtual.pomf70.ta -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId landtual.pomf70.ta -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener landtual.pomf70.ta -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS landtual.pomf70.ta -
Listens for changes in the sensor environment (might be used to detect emulation) 1 TTPs 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener landtual.pomf70.ta -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule landtual.pomf70.ta -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal landtual.pomf70.ta -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo landtual.pomf70.ta -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo landtual.pomf70.ta
Processes
-
landtual.pomf70.ta1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Listens for changes in the sensor environment (might be used to detect emulation)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4799
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2User Evasion
2Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD57eda39fb990a24bac58f5d6e955ee667
SHA1e90608e181ac701ddf0b7898a588a4788d62a2f3
SHA256e1ac88df0be2b14ff34eab4e9150fcb075987e47cc3bc8b4660d5c7e43f5b328
SHA512ce741115cc895767eba73712ca5bc82416cd16226a666611a623f1b4c876d19472c01289842ecaf74528763b8d8a61149fcca67da138b31cf42cf99b1ae5dee4
-
Filesize
4.9MB
MD573b51fb51a7c1838642325dd9aa03732
SHA1f1963286c4e4fae80593fa5555613bfce95c9f51
SHA256a612724a99d62d5bce2470e91cb7d114ff90dea5c722fad0559eb3ab310b80cb
SHA512c0d2201da10c0817b608c881263557432c88864fb97c5ce67d2d7ab7a257f3f7ca979555eaac33322c96e09f08ea1ed002c0ada0f624864ae01c7dd37f5141cf
-
Filesize
17KB
MD5d780f836fe54e51872bf31220a4dcb77
SHA15136aa7fe35fb70c9bf0ab00bbe7f79cf65705ae
SHA25632abf05fd8eb1edb10fd93e2c0bd9b308d109e5686c06b39f4d173847a0efe17
SHA51262842bd62ea2f1a71880415d84501bc2cde8eb857d4baec4e357f3c4c4a74d2d0418bfcc6431789cce207d5290ceb4b1fee31f206ac527a8727176523c0bc635
-
Filesize
20KB
MD557baf3e42a94e8dd82e267b2f0619330
SHA176512dd29fbaf3cfd2efeae0ac2ab5108b81af19
SHA25649a98902c1ffb97354f0e8f0f9208b84dfabaa826635f6ade1fc782169a3ec7c
SHA512227f9d10a39fb0d8ae0a562e3b983fde44de62b3dbcd577172451e0e1f669e5721ba653c324af7c4d022032edd951cc417805a4eeafd5e84f28d378b9126a690
-
Filesize
20KB
MD53299d825e05a9a17e6e272774ede938d
SHA156eff2000344124354df28c463a966f10222d80a
SHA256f1dea8e34d83195166ea3279874a2e0b1f2175189fb3f1285572aa5d7bdc3975
SHA5128e2d3c01ddc0a777d125dbdef30e8dede702896d5885db3b83acb9bb3419d4ef8d3e7ebf67aaed0e36ced86c01c6988c650c2ce275912888ccca8626d77670dc
-
Filesize
512B
MD594bfd35fc3b9a335c74bc1b03e9f786c
SHA1e1b02af1a59744ed7a8da69dc30b7560619c5c25
SHA256c32d684123763992aff69f71d8ce3631ca54ab197e997eab61d3b77e6d9996e1
SHA5129feedd4e86579d9e91e13090130d09f3cbc8d099188e4ab98552d5835504155e97618ecb290630e08d4404fe81966aaddf17daa52be319771170ab613d56fafc
-
Filesize
8KB
MD5250455289b4237a6413c538bdc7c26c4
SHA1658a440a80bdfedc2317989ffe6854b3ccd60202
SHA2565ba72561751f06a00fe39a94469e9c8a410c43cc6c647698fa1823ca61a124ed
SHA51259a73c2aa21004f9f3ae034b757da973428141d4b5713c6874330329f82941695f9b9fad0236cc4b85c537da765f82ab9c6ca9d09b0d01f63accabf444ed8289
-
Filesize
8KB
MD589d4cda9c40ee2434471a81ef9f90237
SHA1f0fd17583287559c9f6a18ae2fb6eb6328a476bb
SHA2562cfd74c51d90c41cf1af0b3391e48d3eb362907319ba73fade9b940eef62b765
SHA512c92a0ad3a49600b165879b3752cab0dfc35e4059278bedbf5a3947bac34552a4afcdd068ae4d299fced1dfaa0778933c0b1453f304ae48cb131338c4aa7a9c58
-
Filesize
12KB
MD510b235f4cd1f4aac17c6e5fe2524f2cb
SHA1424fb8fdf1f1792575629fc8430bc40abf1e94d9
SHA2566a55c9a512b1441ab7fe103fbaf9f73b13b3710694961a451b6668c4acd3815a
SHA512b0a2a14a592f9c16ae65a95da9dc727ead50deed3d2ef343fd3e68751b4fb17e3c7accf5b919dc5ccff1d757d7ffa24752ac8fa05818f10a2cf5df623726ddb3
-
Filesize
256B
MD5ac1c4cb09437433b4e50d3690118b7e6
SHA127a50fc071e2797aa3337a5a99f60e3b415bb27c
SHA25641b806d1e79c72687aa0e26583939b376fde1728551a7b2e75f64a97fd421634
SHA512c57f2ff516b6b06705666dfe76be58925096cc0358da94fd50c78db4773da4a7a309b176aab2865c0c73c01269a3e2aebdcede224f2e05129b48a1cee47c53a3
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD53e398cf1a0e8dcba61cc3b2af0bbc91e
SHA143b7eef728225b184b0497717f902438654c702e
SHA2562ee747a74300cc5742726821ff1cbdd18fbe5c523016ff548ab3902fdf381d2e
SHA512bb9eb3b6c962414e9e46b0c168d5b23fbcc726e18c7d19a83cda57e30a20c635d270856f3fda505d292eccd5adab7cf659e0d79c5e4ba72e2a9d94d37b9833e8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
173KB
MD507a9928052c28c050a33ba327b687730
SHA1a2deeb05d8a7ddebb50f6500a61edbf47a5d6459
SHA2568f16b9b18a470d047a789deefffd5a664690045efc09fe72e5e8d76d8488b43d
SHA5122915b215ef788fc35cd57d31eec7e7ed2b86216df610311feb6a04b038127ccd74f70aa2dad84aa4318accc9fc26ac1c5055cc0eadee476b1a052a126a209586
-
Filesize
16KB
MD54ab9c9c1c889570a3af3bd037a3ca090
SHA176eaa5fd18a19868c75fe986e86e65119b898c70
SHA256e8e4265948b8a6b132aa589af1e6b9d236d1b0be193a72853eb453b9096bd705
SHA5122f8253846933880b23db4633f023aa06a6fb78dcda418524ee445c4071f8b39876f16095de8db53673a48e57499639f7af39a1fc210f96a92c8c278a01bed604
-
Filesize
108KB
MD52e41c230258bba01b720dcf98d505a82
SHA13792aabe2aaf920abc7f692a95db867c9db3bfbd
SHA256037248af3c9ee010f5593a0495f9fff9ed16456a22b15091a9b7f2697baeec5f
SHA512c39851fea61ef04fd69c36d6de82ed6ca876e4dd649dbd847b08aab05db4ed9357bbf329d4cb4218a97a03318170a23e2dbadd3f1ca576e072563d46b569d6a2
-
Filesize
10.9MB
MD535d4cda95e19e9be467673c78e1e2fa2
SHA13868d4dda794c360f57ba650c332b39ce5c68d8e
SHA2566c84643bdddc36a15b515e72e8b768ba64ff6b8966492db9bce6660934f09746
SHA512577272d92633303f248c8545b67a5205489623ce44d746fcdc906ca29c0cdb26f83140f013510c356b709ead230da79fdd8b04654370a2c18275a3ac98344dd7
-
Filesize
308KB
MD57f553f50925945c7d7138227ae983377
SHA1d7d3afcd10dd4e03daefa0e8e242c1a7b77a7162
SHA25610d07387bd954b877c1d1205814d36bf526108b16f8fc55fe48398d350166637
SHA5122202dad0a09b8359f4b07f2f5da2777f4d3a70931825440da3d4bb13639b981917616f6fe394dc093aab044bd6ec7e47e363d2665b47aea21a0540008083ec1b
-
Filesize
265KB
MD59be81be1b34d2c5b45f8ca690fbcdfb6
SHA110300ac02fd9b57f4de8edda3f68ccc1bfab9e6f
SHA256a9081622945a79c3a4209e8d84c8cdeeb30a6b4ac5e8c4c80703d04fd1841b04
SHA5126969fd501aedfce16d2f1d3c2381765687f8f978072a7fa81ead3e1d9e5dec3cf98bcf6403fec47772fd01d137232fd645deddf8c7d640af887f896c2087658d
-
Filesize
1.7MB
MD530465152db261852e3a226a666ec4304
SHA1442a188e07db85653022734d0a8537d4312aef38
SHA256c79795ea1d8f93d6471a6a10ae92f079fa7c79b0736de04edb53c5c5ae4862e4
SHA5123b9b75f7030fa9280130172a7b1f17766b3399270ec49b899d7f4223e68ce7ee728a0ccd5217b98d276da8f84968f4d436b4e61c7fcd378c3be0a57f906dfa63
-
Filesize
83B
MD5f72d8325ad18c7f6525d1a9fc0dbc316
SHA1e8172e2a3b3d35247dfe38a91d101ce9b17b7c33
SHA256527cc2a72bef03873ec1e00097c701de03d181d5f12a01dda0170bfb04ecd082
SHA5121279044877e1512af8f5bc8d2555540adefd25d3e6b0d20ff5f8c3433bda363085a8242194529b96b228c677ee240ef5b96c181b2305360f7e66ad7eb9601034
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-40.txt
Filesize73KB
MD508ca664c9201c358a5e52f717362cabb
SHA1da69b930a7494c778a9883beba20002adb36883d
SHA256d839bbb84770f134f43a5c7bc3bd57f98273b5e3ed6abd375397dd8d710d94ac
SHA5121441678313b1528bc8d6774c8b275be6c081c071c7658c11a782361122b8097d5a3473927978f5158544fd411b8a942ac2d64b373f5cb78ae8384efee19b754e
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-40.txt
Filesize146KB
MD5b77d2e577ed32a33ff92d3031d789fd4
SHA193c14cdb5c2b1460487fe4f2e71d084dbf19567d
SHA25608274fa21a1ad9554de0cddabc5b7c275530f1f2ff35afe72a43540b5a0442bd
SHA512fe28e4c740d8bed0d70abc06a9666e65256fec815072d9c54981d646d90e7ec638c483a16ec4a6e0f8755b49bb30d82ede238d5a4a89f60de8d7e390435fe31f
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-40.txt (deleted)
Filesize1001B
MD51c56b419f043be564ccf85c040ba4758
SHA128c97c81599d098b2034aa18abfc72c6c26ea956
SHA256e37f82553044557524cb0b7d2de8623384e03ba01d61cf1de79b2335577c00e5
SHA512ccdc36a1535485c1b62c64ed3ab1f1ae630494e4590506147468bbf0cddd5f5aad538a576a124da28637cd6e138c25ef91433d048ae8422b0d40772d6ae6fd24
-
/storage/emulated/0/Android/data/landtual.pomf70.ta/cache/records/com.android.settings_2025-03-21-23-52-40.txt.zip (deleted)
Filesize5KB
MD5f342208ad59a72146cbc7cff54a1b1af
SHA113eb0bc62f6d857886aa4845807d73e7d745cd58
SHA25689d661c44804123cbc2dc5873c84303dfc20c4f524f231a7768c20746cf507b1
SHA51228621fe7e11366bdc24c980ca6109088a5ddc3e6e29fa9f6ac41575bd4694a88c082064b629bebd7c52123c33565c7d24579e26d0f0bd73cfb02150a9091cd4d