General
-
Target
702d8ae90b3535bf923522cdce541922065fd31c23356474d04c29245ef153ab
-
Size
8.6MB
-
Sample
250322-a6jtlat1a1
-
MD5
1e601badb689ec4328e7206483f7fc8f
-
SHA1
d103db4da641e5dad66226087c45a92f5a35ec3d
-
SHA256
702d8ae90b3535bf923522cdce541922065fd31c23356474d04c29245ef153ab
-
SHA512
91b042429caf3ec6709f816d80f95930fdf4bd81965ea7e4232b7d3bdf4560aba64e0e181d5186896dff49137644915381f166835863be2627928882bd77298b
-
SSDEEP
196608:oOsWNIJ8HMmitHQfX1BSNlit0XvuYznJcTZBzhBfCR:/Ps01gNlit0Xv7zGLzh8R
Static task
static1
Behavioral task
behavioral1
Sample
702d8ae90b3535bf923522cdce541922065fd31c23356474d04c29245ef153ab.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
702d8ae90b3535bf923522cdce541922065fd31c23356474d04c29245ef153ab.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
702d8ae90b3535bf923522cdce541922065fd31c23356474d04c29245ef153ab.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
trickmo
http://somakeawish.com/hpuex9yu0lfad7pjoxcl
Targets
-
-
Target
702d8ae90b3535bf923522cdce541922065fd31c23356474d04c29245ef153ab
-
Size
8.6MB
-
MD5
1e601badb689ec4328e7206483f7fc8f
-
SHA1
d103db4da641e5dad66226087c45a92f5a35ec3d
-
SHA256
702d8ae90b3535bf923522cdce541922065fd31c23356474d04c29245ef153ab
-
SHA512
91b042429caf3ec6709f816d80f95930fdf4bd81965ea7e4232b7d3bdf4560aba64e0e181d5186896dff49137644915381f166835863be2627928882bd77298b
-
SSDEEP
196608:oOsWNIJ8HMmitHQfX1BSNlit0XvuYznJcTZBzhBfCR:/Ps01gNlit0Xv7zGLzh8R
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1