General

  • Target

    637c727cd4f78d893569dc713ee427b90394cfe0f56f0f6f480b076b7713f275

  • Size

    7.1MB

  • Sample

    250321-wtp1qsypw5

  • MD5

    e250e6668454a72b896cca90e49b486b

  • SHA1

    e377280b6633e4e9ae2e75f9fe4d1dbb9c78f094

  • SHA256

    637c727cd4f78d893569dc713ee427b90394cfe0f56f0f6f480b076b7713f275

  • SHA512

    1277ac42858b558f8605866a4b186f70bf1c7fdf64f0006a0b1fe8a8ff981add8a2aa9d4b927ce09b33e4f2789492c71aed68a443b2266032613b9a033170011

  • SSDEEP

    196608:G4tTU24z1siG6V5tIzbMzcWrAq5EbOvqYRjv5LEs:jU2W1siXVAAzcyEbOiWRL1

Malware Config

Extracted

Family

trickmo

C2

http://b-fulltime.org/u3n6hcu6te3b46gc

Targets

    • Target

      637c727cd4f78d893569dc713ee427b90394cfe0f56f0f6f480b076b7713f275

    • Size

      7.1MB

    • MD5

      e250e6668454a72b896cca90e49b486b

    • SHA1

      e377280b6633e4e9ae2e75f9fe4d1dbb9c78f094

    • SHA256

      637c727cd4f78d893569dc713ee427b90394cfe0f56f0f6f480b076b7713f275

    • SHA512

      1277ac42858b558f8605866a4b186f70bf1c7fdf64f0006a0b1fe8a8ff981add8a2aa9d4b927ce09b33e4f2789492c71aed68a443b2266032613b9a033170011

    • SSDEEP

      196608:G4tTU24z1siG6V5tIzbMzcWrAq5EbOvqYRjv5LEs:jU2W1siXVAAzcyEbOiWRL1

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks