General

  • Target

    bbefddee16638eedbea8c970dbf9f052aa4e42c5cc7cee59b8758788a27e98d2

  • Size

    7.4MB

  • Sample

    250322-aajhysxmy9

  • MD5

    b228cff097466d7a5077ef6ac94ac862

  • SHA1

    3405bbe0c7703dbb6e5829b90e25d0efebe6b9d7

  • SHA256

    bbefddee16638eedbea8c970dbf9f052aa4e42c5cc7cee59b8758788a27e98d2

  • SHA512

    f807fadd8e450c7b2a53ed387211059046cdd4fa030a0f7c6525e983e4fa3d263ce86bb9e4c9804fa239a0e57e016d703761b055e3dc0efd68327d5ca4e8b4ba

  • SSDEEP

    196608:8XBBT18xyoVgPdynjh9Z7qNK3zI7cS83nP4/nh7jTi72I+5FZzorwUWDV:+XT1Mcc9Z7wb7of4/h7jQ2jOrRM

Malware Config

Extracted

Family

trickmo

C2

http://techpoint.cn.com/c

Targets

    • Target

      bbefddee16638eedbea8c970dbf9f052aa4e42c5cc7cee59b8758788a27e98d2

    • Size

      7.4MB

    • MD5

      b228cff097466d7a5077ef6ac94ac862

    • SHA1

      3405bbe0c7703dbb6e5829b90e25d0efebe6b9d7

    • SHA256

      bbefddee16638eedbea8c970dbf9f052aa4e42c5cc7cee59b8758788a27e98d2

    • SHA512

      f807fadd8e450c7b2a53ed387211059046cdd4fa030a0f7c6525e983e4fa3d263ce86bb9e4c9804fa239a0e57e016d703761b055e3dc0efd68327d5ca4e8b4ba

    • SSDEEP

      196608:8XBBT18xyoVgPdynjh9Z7qNK3zI7cS83nP4/nh7jTi72I+5FZzorwUWDV:+XT1Mcc9Z7wb7of4/h7jQ2jOrRM

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks