General
-
Target
d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f
-
Size
8.8MB
-
Sample
250322-abmxrsxmz9
-
MD5
b8749ed305053ea52cb866fd6dd7444c
-
SHA1
cd9931622abdaca64ee70021965606a199c2bc12
-
SHA256
d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f
-
SHA512
6d2dc1cde0dd94ed4ce4abef7334f5e703559a6d2749bbed2cfa264c4b6a5cad45716fcad47f506777f3e73c6dfd23c9d538e607b4012e46227d29362935e5bc
-
SSDEEP
196608:JbUoY2S7vhEYoQRl90WGQ647qfsrLgbO6JL1gf408gBArrX/s0WbhJ:JbUoYvhN90LH47qUaL1g5tAXPFWbP
Static task
static1
Behavioral task
behavioral1
Sample
d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
trickmo
http://somakeawish.com/hpuex9yu0lfad7pjoxcl
Targets
-
-
Target
d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f
-
Size
8.8MB
-
MD5
b8749ed305053ea52cb866fd6dd7444c
-
SHA1
cd9931622abdaca64ee70021965606a199c2bc12
-
SHA256
d92c8fd829d80c9b0700fd077957d8a00ff17064b001d147233b971aea0e442f
-
SHA512
6d2dc1cde0dd94ed4ce4abef7334f5e703559a6d2749bbed2cfa264c4b6a5cad45716fcad47f506777f3e73c6dfd23c9d538e607b4012e46227d29362935e5bc
-
SSDEEP
196608:JbUoY2S7vhEYoQRl90WGQ647qfsrLgbO6JL1gf408gBArrX/s0WbhJ:JbUoYvhN90LH47qUaL1g5tAXPFWbP
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1