Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
22/03/2025, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
345e172356ee2b29eb4d9a0f7b6ee7dd726e8795e1dbd245b4be5e2b7796b0f0.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
345e172356ee2b29eb4d9a0f7b6ee7dd726e8795e1dbd245b4be5e2b7796b0f0.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
345e172356ee2b29eb4d9a0f7b6ee7dd726e8795e1dbd245b4be5e2b7796b0f0.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
345e172356ee2b29eb4d9a0f7b6ee7dd726e8795e1dbd245b4be5e2b7796b0f0.apk
-
Size
8.9MB
-
MD5
80d89d1f2000ec6e41ec686e6c2499b7
-
SHA1
97517bde058bbd3d1a785edc1a55a76573bd8925
-
SHA256
345e172356ee2b29eb4d9a0f7b6ee7dd726e8795e1dbd245b4be5e2b7796b0f0
-
SHA512
eafae525d54ca46be783c8398848651c43bd5136f62eb54f50996d149ee1274f6aa6c33b74627733a0af76370b4bf75e8041268c47c9070d090d60c4a07c7e71
-
SSDEEP
196608:Sjcvj4HDaHNva2kIbcHJcUyOJNy6Uo5Zkajv5LQy:zr4Hutvazc8J9zT5ZnRLQy
Malware Config
Extracted
trickmo
http://b-fulltime.org/u3n6hcu6te3b46gc
Signatures
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/bakeph.dist292.blog/app_traffic/MctgTq.json 5071 bakeph.dist292.blog /data/user/0/bakeph.dist292.blog/app_traffic/MctgTq.json!classes2.dex 5071 bakeph.dist292.blog /data/user/0/bakeph.dist292.blog/app_traffic/MctgTq.json!classes3.dex 5071 bakeph.dist292.blog /data/user/0/bakeph.dist292.blog/app_traffic/MctgTq.json!classes4.dex 5071 bakeph.dist292.blog -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId bakeph.dist292.blog -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener bakeph.dist292.blog -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone bakeph.dist292.blog -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver bakeph.dist292.blog -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule bakeph.dist292.blog -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal bakeph.dist292.blog -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo bakeph.dist292.blog -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo bakeph.dist292.blog
Processes
-
bakeph.dist292.blog1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5071
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5956ec6d809a6e35ddd3155b0a2a93bac
SHA1560a650bb0055c4d11f008d2aa8c6abde9146987
SHA256e24376abaa5c9c55a63480ab7c274b9d678abf4a08b9ab83106d43dad05d0d11
SHA5122ab03b754c3595c537f06268d5043a7311ba2cb272de2533410a5e53c9d234b9316fb2c8ac012ac1e217457bf714dfbcd43ab70d7c88dbf107210a8f5bcf1c42
-
Filesize
4.9MB
MD573102177b62492c2a7935c4417376461
SHA1fa32afcfae2593c05099b15876b567477ee91d7e
SHA256914f1fc352b3b866fe36e776775484208ff7eef2a20a63e171e82c3c80c68c45
SHA512a1ecba1e72774fb153e60a5fbf24b86e82c7567256da412d517ac11963c874d9b88f355843d1ac774dc8edad2bdcc9000134244708101b5399edfde52ac25b59
-
Filesize
17KB
MD5d780f836fe54e51872bf31220a4dcb77
SHA15136aa7fe35fb70c9bf0ab00bbe7f79cf65705ae
SHA25632abf05fd8eb1edb10fd93e2c0bd9b308d109e5686c06b39f4d173847a0efe17
SHA51262842bd62ea2f1a71880415d84501bc2cde8eb857d4baec4e357f3c4c4a74d2d0418bfcc6431789cce207d5290ceb4b1fee31f206ac527a8727176523c0bc635
-
Filesize
20KB
MD593e7f88ba7fd4f0152e8e5dc56f1acc0
SHA1f29883585567a32fe4d487e5df14173c39c09e65
SHA256dc6bc98e7f294d8994b3120cb87c0ed1d998e559daab810a68323a8968c60c2c
SHA512be40cb85f75181627e2e4f7fb01e371ad4ce5051416d7e931ae45479a1357526e89a017aa461de03076c0b650eb5c851c239e88556677e859bb9b7c28e48d745
-
Filesize
512B
MD5bc557b287050399415746500e917f72a
SHA15902f2cb38894ce8c949ee5787b34f6638383f73
SHA2569a273bc0fa2941c8984d0862a23d0be5cabb5346e6f92ad3cbf26157a4477d52
SHA512426f9496af1275bde1c5e44b6f7105ce9a6e5339f7e747c060291ca663e3a77a6913f45c9f0874b48d24b1e301e20a926d9240c8148821b3a28eabc704b851cd
-
Filesize
8KB
MD54d4a0732a70c3b09a315e159e6d2fb80
SHA1dcf5d0a970ddf8eaabff4b1492f444e14bf85a24
SHA25654f2ca88db8c2f42329d020cc6c7e1e35de6aba020aa65ce41d6dd65b9657e76
SHA512b5e0933569939e4d265a6e804c5f42dcce6ee695eebf97faa7b4f083c3d34e1a8bf87c15f6fdc8408e0fb66b8aa658c561123b7cccc241737e56c5eab9956e06
-
Filesize
8KB
MD5b4b03891237a5ac6d78c9e1abfcce914
SHA17e4020bf2b534925309eeeed3bf9e9f0866e7166
SHA25684c67a3c42e9edd851ae8fc69857c97a57584d5dc2450366b1d4fe0ba8e52e46
SHA51295df4e021c8ea5f5d402385ea3d7a6975aa588eb1b04683c39c3105b825a0dd72774b78e4d176e72ac1b502e7de907c2e9236c9b5f7a78ab2e8d27040a60a28e
-
Filesize
256B
MD5baad3b19528cabe4953c054b55a441d0
SHA1dd100dd0d0158b77b07626b4996ba636f62e5cb6
SHA256040c1e0f5d3db0241a49d3a0fecb7d9eefcab6212eb78c66dd6569d4fa17c176
SHA5126de0a98864ef582024b46637c9a0251b161831fbc451f78987078626b914a25c92a041b821f3ee8cd2657001da70114b3a4d11fa111e3d643d5207685589026f
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5d80947409d8398d00164ae4439e91e33
SHA118c37552c68fe47ed4ff9778efc5c1ee2f13e21b
SHA2562a5507df98a99b87a54dee1fdde5b1745ba3a40204d8361737c8d675a7897007
SHA512991feb349790028fed3b5c2c08780462f248a0812e28f08cc0388185b4043abb7fea260d53d8b58bb6f348e3985547f092dc62efa7182cc0b79a5fba11c73708
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
173KB
MD59d3a9596e8b95f349fd2c3a09c3ed75e
SHA1ded7aa77ebc65121ce2b96f19034d180bc1f4931
SHA256b757fdb04ccec12a4385e58cb8a382e035d71d4c5de7fe4c2a5e8fae358d2924
SHA5123182d643acfe2e5424011b3499a4587843255b34afb16d6de89ff0f31e4ef4e6b29a9cd18b534a6455bb751fb5f739cd58984cdbd1478cefd3e82e17bd0e89cf
-
Filesize
16KB
MD5cd6f95afd62362174f8ecf06509fc1d7
SHA10460ce682548dbe86d81958103e5edae8c111459
SHA25694d3a529e78b7bf34e28cf369e937a107ae9ef7d3c0f15333d52282b4135d304
SHA5120f0bed14d8111e256414ac7064f577e9f32a02eacbad7a21737301f8683ea6f7e93240b211cb2e1f2be49db70fc2f0fdbb33aa2f632972ab172e3dd94f104eee
-
Filesize
108KB
MD58c652d40bfdb6284e1a700439bdfc2ff
SHA16f15a2103fe360f30f2ce4054594d5b414c364d1
SHA2565899d6c8a9d1a491e3fcb95258677fd8e23f451913c004e234e3223b941e24e6
SHA512b90bc0e0608bbb59753510eb3ddacb08c125b531c20b3832a46debae3cf930c292f5ca35a47f0f9e9e01d0a5302ed2f087b418fb603ff4883e3854ca5c88bc31
-
Filesize
10.9MB
MD535d4cda95e19e9be467673c78e1e2fa2
SHA13868d4dda794c360f57ba650c332b39ce5c68d8e
SHA2566c84643bdddc36a15b515e72e8b768ba64ff6b8966492db9bce6660934f09746
SHA512577272d92633303f248c8545b67a5205489623ce44d746fcdc906ca29c0cdb26f83140f013510c356b709ead230da79fdd8b04654370a2c18275a3ac98344dd7
-
Filesize
308KB
MD5f6b89acc1728c7d64be4b042fb787711
SHA1a1839b0bbfe36db9e1de750895093a41872dee58
SHA256e38f1a99e3b77b0d416161420651ed11a069de45e9cfae7e41585a3c9ddde806
SHA512ad74d6dcbea2ee263d451353b773701165d6334dafde8b4254fad369eb544996bbf64d5db2b2423932751fbfd9d7e42faec67dd552384e1d6a00a89c0ecdd7e2
-
Filesize
266KB
MD553410124d4dbd239d7962deabcce6d8a
SHA185f8e02449fdb7eb7a4a7d6f95603c0c381bd135
SHA2561b5a77a13977c67a4bfe73584e22103aa7656a5750abdb3c7bcc302269b72073
SHA51259b2796a1d1b7ccc6f7887e4d674d9bfd0cc4c4b851265e7fed0839d754a0058008cd622062c610471e5ff7eab0f269da16a9e0d5d75c19dbbfb16c05bbb4d7b
-
Filesize
1.7MB
MD530465152db261852e3a226a666ec4304
SHA1442a188e07db85653022734d0a8537d4312aef38
SHA256c79795ea1d8f93d6471a6a10ae92f079fa7c79b0736de04edb53c5c5ae4862e4
SHA5123b9b75f7030fa9280130172a7b1f17766b3399270ec49b899d7f4223e68ce7ee728a0ccd5217b98d276da8f84968f4d436b4e61c7fcd378c3be0a57f906dfa63
-
Filesize
83B
MD56b50c9439c0ac8e6d0f04421ce8086af
SHA1cf4e86c995de60225f5370910a5ef3ae54e2d590
SHA2566df9df646103ac0ba59c7cd689dc119c304da99ad7d09338b0bb32187fcf2132
SHA512486c69b21225f0d1bcd5cf4b758884ee5016a83a223602478fcb3c41a5017b035e30d36354d8b0aee627150624946c816d31624d96ad6b7a1edac298cd2ac890