General
-
Target
9e5da5bf917acd4132c8b3d4b63af9b23d7bc16e71e51bffcd4a82162e598394
-
Size
12.8MB
-
Sample
250321-wctbtsyj19
-
MD5
f5071e7fe4f8d85ece2e28d678a2b7e2
-
SHA1
4a6fd8b9a7132089420de178f294466166081e7f
-
SHA256
9e5da5bf917acd4132c8b3d4b63af9b23d7bc16e71e51bffcd4a82162e598394
-
SHA512
0585e7d2bb7f07c8616025fc51b9d091b147572437936add16358f5b3ecf35acc91bb178dcb90f0e81ebbe99d9f533ddd3436e7623ea16f4574315f78395d584
-
SSDEEP
393216:ZZD8O1T+BHMRrmIk08UVryK9+gtLbrNbaEetg:nIOmsRrZk08UgKg2LPNLetg
Static task
static1
Behavioral task
behavioral1
Sample
9e5da5bf917acd4132c8b3d4b63af9b23d7bc16e71e51bffcd4a82162e598394.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral2
Sample
9e5da5bf917acd4132c8b3d4b63af9b23d7bc16e71e51bffcd4a82162e598394.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
trickmo
http://monster-truck-mx.info/c
Targets
-
-
Target
9e5da5bf917acd4132c8b3d4b63af9b23d7bc16e71e51bffcd4a82162e598394
-
Size
12.8MB
-
MD5
f5071e7fe4f8d85ece2e28d678a2b7e2
-
SHA1
4a6fd8b9a7132089420de178f294466166081e7f
-
SHA256
9e5da5bf917acd4132c8b3d4b63af9b23d7bc16e71e51bffcd4a82162e598394
-
SHA512
0585e7d2bb7f07c8616025fc51b9d091b147572437936add16358f5b3ecf35acc91bb178dcb90f0e81ebbe99d9f533ddd3436e7623ea16f4574315f78395d584
-
SSDEEP
393216:ZZD8O1T+BHMRrmIk08UVryK9+gtLbrNbaEetg:nIOmsRrZk08UgKg2LPNLetg
Score7/10 -
-
-
Target
base.apk
-
Size
7.6MB
-
MD5
3be791e432b3ef50c0c947968afb41b1
-
SHA1
6aecf3056085a44d709879f726b36447ee9f5610
-
SHA256
6c968e052fdb59730897cc37a0e61e69a8c5a20f04400c0276534ae0604c430d
-
SHA512
9def8ad356092a24e936c735b9fb3122a7dfa559c5b2ba2ac8e92428accf4bfadff77c51e893acb917fc6b758de99986c66bd90d8135d5ac89e99e1dd5d952b6
-
SSDEEP
196608:xtK7pfMaBf8C4GfJCtMJCp1Uawqy+DbufUVjv5Lpb:/u1MokCdfEwfqypkRLZ
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2