General
-
Target
26b7c0b09bf02742ce0a07d7584a20c3bf78382d696e5e76f0dcc4b5da9425bb
-
Size
13.5MB
-
Sample
250322-apqktatxa1
-
MD5
daeef69481050078388141a95cf5aa6d
-
SHA1
c0cbfefd361a15bf8ec180f7da35bcfba3ea4593
-
SHA256
26b7c0b09bf02742ce0a07d7584a20c3bf78382d696e5e76f0dcc4b5da9425bb
-
SHA512
96e711b122504c0489019e366869b622d1c26f766c2adb05c8c4d431b74c8e35376c7c9180293326b17b58379629ab65e371f2180416e1602cb60fde321b3800
-
SSDEEP
196608:ZqHM1pMza6/6a4OAY8kl4gCnLyZvP84RnI39qpIsEsptCZGSfbgVLbNfEtv5bHf:ZhpMORh3kl4Z+6II3Owspt0MVBwBb/
Static task
static1
Behavioral task
behavioral1
Sample
26b7c0b09bf02742ce0a07d7584a20c3bf78382d696e5e76f0dcc4b5da9425bb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
26b7c0b09bf02742ce0a07d7584a20c3bf78382d696e5e76f0dcc4b5da9425bb.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
26b7c0b09bf02742ce0a07d7584a20c3bf78382d696e5e76f0dcc4b5da9425bb.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
base.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
trickmo
http://b-always-free.org/u3n6hcu6te3b46gc
Targets
-
-
Target
26b7c0b09bf02742ce0a07d7584a20c3bf78382d696e5e76f0dcc4b5da9425bb
-
Size
13.5MB
-
MD5
daeef69481050078388141a95cf5aa6d
-
SHA1
c0cbfefd361a15bf8ec180f7da35bcfba3ea4593
-
SHA256
26b7c0b09bf02742ce0a07d7584a20c3bf78382d696e5e76f0dcc4b5da9425bb
-
SHA512
96e711b122504c0489019e366869b622d1c26f766c2adb05c8c4d431b74c8e35376c7c9180293326b17b58379629ab65e371f2180416e1602cb60fde321b3800
-
SSDEEP
196608:ZqHM1pMza6/6a4OAY8kl4gCnLyZvP84RnI39qpIsEsptCZGSfbgVLbNfEtv5bHf:ZhpMORh3kl4Z+6II3Owspt0MVBwBb/
Score7/10 -
-
-
Target
base.apk
-
Size
7.9MB
-
MD5
f525baeadeacf35b7ad1a678704ddad6
-
SHA1
6126abb50a4842799ac33e4a39434e43475a6a0d
-
SHA256
8773345e94b7f8ec7ed5515e507f72ad7358ecf7efca360a719ac7a39d18456c
-
SHA512
daa597e2f6d2eefc9fb8f7c349b6a51a9e059a3a7d90ceed9f6c7ed71776ebf4a2b7c8aeabd984f800420cf3cdef0f3526dcf0685a94db7380bf0df2bb4cab7e
-
SSDEEP
98304:wNDTv2Eq7sH83EhsrdbQ6r9dFb2LhqtVTKMiXPGYMKNG0rz4fqW7HCfGsG+x6zZV:ubc+8bQmO0XTg/GY5NGxlJPzZvjv5Lt1
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1