General

  • Target

    de2f904d65eba7777a07c589376da441bbfa08ea3b42f66f558f17ef25e52198

  • Size

    8.7MB

  • Sample

    250322-a6fryat1az

  • MD5

    9b231942e29f923ef4fb97282f0f2f45

  • SHA1

    e5a47a7adf82646459dcb07022ff7f8416e90afc

  • SHA256

    de2f904d65eba7777a07c589376da441bbfa08ea3b42f66f558f17ef25e52198

  • SHA512

    5e9f5319b2efdf65ce5b76858445c910cd6b787694fb6cb5e43f5ea4103f0bb57d9f8f6246fcd99e885e9355773fd54e642253a410b40049ce9b6d0b7223fb15

  • SSDEEP

    196608:tZgnrCYktUe6gLshD/xDdhhVKGcME6JI6ynpqOLjv5Ldh:Lgn2d6FD/RXhVL3E4UPHRLD

Malware Config

Extracted

Family

trickmo

C2

http://monster-truck-mx.info/c

Targets

    • Target

      de2f904d65eba7777a07c589376da441bbfa08ea3b42f66f558f17ef25e52198

    • Size

      8.7MB

    • MD5

      9b231942e29f923ef4fb97282f0f2f45

    • SHA1

      e5a47a7adf82646459dcb07022ff7f8416e90afc

    • SHA256

      de2f904d65eba7777a07c589376da441bbfa08ea3b42f66f558f17ef25e52198

    • SHA512

      5e9f5319b2efdf65ce5b76858445c910cd6b787694fb6cb5e43f5ea4103f0bb57d9f8f6246fcd99e885e9355773fd54e642253a410b40049ce9b6d0b7223fb15

    • SSDEEP

      196608:tZgnrCYktUe6gLshD/xDdhhVKGcME6JI6ynpqOLjv5Ldh:Lgn2d6FD/RXhVL3E4UPHRLD

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries the mobile country code (MCC)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks