General

  • Target

    07b114daff3e1edd5e7f1a2f813cd7dda6f3902cda03f1a8f4ecf230efa52ef9

  • Size

    10.4MB

  • Sample

    250322-akdqfstwdv

  • MD5

    f69bc6289179b4ce9f85e736cdc59a24

  • SHA1

    a35a253dcde3b6489a7558af9ebb57e89add7fea

  • SHA256

    07b114daff3e1edd5e7f1a2f813cd7dda6f3902cda03f1a8f4ecf230efa52ef9

  • SHA512

    05f9ec614651e85ea83d0375287efa0fcdebcdd9b8f021120391dcfe3dbb0e87b7cd6fa89370395395d27139cb1f667752f57c89ee662d36b2a379cae8680fd2

  • SSDEEP

    196608:fzwwJTKJYA18D7TqdyX3qJsupHdDFy/B+sI3tWjJ4ro6eZhn:fUWe0nNqSitFy5+sI3q2ro6eZJ

Malware Config

Extracted

Family

trickmo

C2

http://traktortany.org/c

Targets

    • Target

      07b114daff3e1edd5e7f1a2f813cd7dda6f3902cda03f1a8f4ecf230efa52ef9

    • Size

      10.4MB

    • MD5

      f69bc6289179b4ce9f85e736cdc59a24

    • SHA1

      a35a253dcde3b6489a7558af9ebb57e89add7fea

    • SHA256

      07b114daff3e1edd5e7f1a2f813cd7dda6f3902cda03f1a8f4ecf230efa52ef9

    • SHA512

      05f9ec614651e85ea83d0375287efa0fcdebcdd9b8f021120391dcfe3dbb0e87b7cd6fa89370395395d27139cb1f667752f57c89ee662d36b2a379cae8680fd2

    • SSDEEP

      196608:fzwwJTKJYA18D7TqdyX3qJsupHdDFy/B+sI3tWjJ4ro6eZhn:fUWe0nNqSitFy5+sI3q2ro6eZJ

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      deper.apk

    • Size

      6.8MB

    • MD5

      fb036e22c765cf7dfa625b25ed43b520

    • SHA1

      bf36e7998e76f1b6d64b833fce4e2fbd2df67621

    • SHA256

      0f0f6a50d4d96be437251a0029aebb34b53fdf4b3adb838dcffd217bd657e6d3

    • SHA512

      aad2051941c707d8cbd2f2e26000d1835f11cc5ae503776213ca4e81c8d96c9fb0acbee0d46ddd3a687ef2ab8cd37df062500d29270519d27a4f60ad51c5d135

    • SSDEEP

      196608:84NS+koOTZwleubHrPlCDruIexT2FDuxgey:5NpOissrlCvuIexiqxgey

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks