Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
21/03/2025, 23:57
Static task
static1
Behavioral task
behavioral1
Sample
a5c27285f6430c0b0550fdc6040795e772246458e33aed4c0dc263dbcf4c1133.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
a5c27285f6430c0b0550fdc6040795e772246458e33aed4c0dc263dbcf4c1133.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
a5c27285f6430c0b0550fdc6040795e772246458e33aed4c0dc263dbcf4c1133.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
a5c27285f6430c0b0550fdc6040795e772246458e33aed4c0dc263dbcf4c1133.apk
-
Size
9.5MB
-
MD5
024e9e7e1c50c32b84a48a5e4d0db0fe
-
SHA1
7e699eb65a644a076aca47f55d76d747efb3fc2a
-
SHA256
a5c27285f6430c0b0550fdc6040795e772246458e33aed4c0dc263dbcf4c1133
-
SHA512
d5bd18194edae257c31a0913c3e6f4e9295de64a09df96a9857f24d68960fc7008968782f9a43853259e6b728cac88d2f410292e1acee219a89b09d3586e3ad3
-
SSDEEP
196608:s9WPt+jBDpRqOOvyBs1zNn48YErSsFhoq:DqvqOdszNn4irSseq
Malware Config
Signatures
-
Antidot
Antidot is an Android banking trojan first seen in May 2024.
-
Antidot family
-
Antidot payload 1 IoCs
resource yara_rule behavioral3/memory/4621-0.dex family_antidot -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sulapije.cpu/app_tank/trHY.json 4621 com.sulapije.cpu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sulapije.cpu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sulapije.cpu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.sulapije.cpu -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.sulapije.cpu -
Performs UI accessibility actions on behalf of the user 1 TTPs 3 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sulapije.cpu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sulapije.cpu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sulapije.cpu -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sulapije.cpu -
Requests modifying system settings. 1 IoCs
description ioc Process Intent action android.settings.action.MANAGE_WRITE_SETTINGS com.sulapije.cpu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sulapije.cpu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.sulapije.cpu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.sulapije.cpu
Processes
-
com.sulapije.cpu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests modifying system settings.
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4621
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD554eb314e282f4ab30a3756569dfecc43
SHA1c44c00d030d43fc5c24e52c9d63a3a5ed769952c
SHA256b2ebe72c1be59800b3ffb6259930640ba5988632fe6460a35a907aca2296ca9e
SHA51228446ede66ed32fa7705af5d3776181adabb137caf3f1d280f650f5917ef438ee14df17492baf72f57a956367a4523d5d314b2d44c570320ea39df25f443e7da
-
Filesize
950KB
MD562b3c534f4db0a8b10347a35ab6ebb60
SHA17177a7994c781d36face4e8c7157b13253a75648
SHA2567af7e184ec1be876b41e2f7909460a74ba142fadaadfdd8696bc09f151e863f9
SHA512c9cba8e878938996e299b7e8b4a22d4f83319604c8e8c12e2782e96ec0221e4a6cec77b5de03f2ff5c29f67efa3b32b6e48fb612531712d195ecf80436963aa8
-
Filesize
950KB
MD5b280324c767dcaa9f90286034c623601
SHA1808ea70b641618b7d28a729f6fdee8dd19e87a56
SHA25699f8042e338249ddb79c07367b777b3421b4d56d0b504be974e6ff322abaa11b
SHA512904c47c43539b1d12a2f996e45b65abe6669fdcb1e8f64dc36008b647c9607c203e642ad6dcde78ade4bf5a3f051c261c4a3a06eb6242bc16d0eec2751abad2d
-
Filesize
8B
MD5a7466ee47fc3253b9e86e256b7d02c54
SHA1dcfb8cb42adfcf01f8e42e69506a089082aa1c79
SHA2565f9287782ccb792ba6187b974c65aad33f141d35643e3868f36705ab5a0727b2
SHA5120da2c13c2528fef7917019f4e659369eb17b5dd950badfc35f3e2377f9183f3eeaf8aa246800a98eab5699e48edf76ebd04914f61ff2ab393a36e045ed776336
-
Filesize
104KB
MD5125c53b7a59284bf410d6b1df0910d50
SHA1b6d440551c46a681a2ddb65f8ad2e561f753074c
SHA256559e0f090f4adf8371acf69ab69c406cce09d97eaf13e0129e7962481b8d3de3
SHA5120cc712f37358f987664d30c27999794c8864e10566b47cbbdd0f0a14e32a774aeb73e1bddb85b1963a13ff2b19af7afe0c17f3ae1e83834ca00489bc29a2b1cb
-
Filesize
512B
MD5ed4eed11e71de86bf1ab5333a7fd38cc
SHA1a4165d8e663548464eb8df1c37090fd07a4da5d1
SHA256988977a56deb7a03d34a806c8c0354150e709f2735d90e3bf3fbce7444b8df00
SHA512b4fa074d639442a73c77d032ab3e8bdaf7a11f7fe86679079d19580b3bfd3adeb361205aa703997ba75399556a2436b994a2732c95bb1be00758e5ab296ab757
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
426KB
MD500f9cb98cad4de97edcee37c44e589f7
SHA1e5d627bb96b5b0edd0bef777a88bef7987aba5bc
SHA256e4793c19fd28454964325bad277d4ea494d9e8fa8ee152abe99772cc074bb5ab
SHA5126a1f52520550e6591f722535029b41e59568154c25c38d17304aa3abe89dada2bec37372883ba057f8e19bd7dcce17b9cbefb11ddd1ad249834c212641c29129
-
Filesize
16KB
MD5df87e2cb3e49a188743e76ae53349509
SHA18c90c9c56cddd98590e19408f1436677d317d23e
SHA256d016485eb9ae5761a7c25d266ac19bb011658c534bfbfaf254d65d251392dfc8
SHA5123172ab81e3b06b10b219b30412a4cd3f633eb02c6a82eb7f231769e56a9e0a88d84c8d8ac18285a60560d74f8ce569d2c7f05cdd7c5695d506e00c9bed165c57
-
Filesize
116KB
MD5cdd6011a591a38515a3468cc2ce92c6e
SHA13b0ad1fe62fb462631164b1280e8b6e04014db1c
SHA256aa950320311a5f4d8b7a084cd7b55433a3489746805945e91dfb2b35036790bd
SHA512b9f67d4eecf2b4c202fb225880b21d1c3dc10863891e73b2b98f19aeaa5724b197e211c28f40a16657a6db1a0fa0ad3c298fcd6960de67a003cac6520b181566
-
Filesize
1KB
MD51683a52ac6cb9678ccf86b97b0130ce2
SHA1cd37caec777cb847bbecc519fd026ab753e38957
SHA25643909aab18ace2ce0fb70e245b08d64d54725fbe5ec767d10d69b63c32cc3506
SHA512b96d42de01f6ee72256215b7f6234b00bdb5102b89dde2af953f5490b59d3f9607c461e17099e5d1ee78d89a30a3bc96a91dc33071b79becb1b7d0f72ae0d758
-
Filesize
184B
MD5453e9364e4f88c2c278d16b65b0457f6
SHA1f69088a3dc8c010f3a76e4c90ad8ddddf0507191
SHA2568a0ad538e071e8880b406d77f25decb16a1cfc60b18839019da25b2b211f6e69
SHA512eec9ead82ca4acda6ff54b164a47658e1ff12b17cdbd5a080bffcd1fb2f6057038c2b20f43687c5bc93e09a18ac529ca1578a24bf366e77f82f65571b73f3b1b
-
Filesize
2.0MB
MD57af79a136585b0185331bf5064bb6b0c
SHA1ab77421e5b5fe788fe303af3062bec71897686dd
SHA2568fa0d8d95ca4b0dd3217d105550ec60d31c22935ed3b18cd1fa83be9ce5c5ac6
SHA5121572d67a9246b9abe80906a9202137acaf9ce95889a59f9632687be2bb2953733e835454d11394665dafbfe92edb8d83575b06efe2b8136f363de91febf62df2