General
-
Target
4df101836ec39711255b56a4fa3d2843b3ab6aab675e510953122e4bf6372fe6
-
Size
12.6MB
-
Sample
250322-ax12hsxrt7
-
MD5
6151b95d963680e705b7ac9c94976c2f
-
SHA1
36f8ae11c1a63aa76dfc9d40e07bcb32f47445ea
-
SHA256
4df101836ec39711255b56a4fa3d2843b3ab6aab675e510953122e4bf6372fe6
-
SHA512
5a0d50eacd5c4ee14342d9f1086b3737368e2704b0229f976de467ac95b36e8f72821a9305897b9877842adc1747bab844b06d1e9d6f5966ed8652d6b42ce5ab
-
SSDEEP
393216:jebElJRwdvKMaOe8Fpc71sgaitiFbyHzgVIZK:jRJ2v0wFeJsPi0O0QK
Static task
static1
Behavioral task
behavioral1
Sample
4df101836ec39711255b56a4fa3d2843b3ab6aab675e510953122e4bf6372fe6.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral2
Sample
4df101836ec39711255b56a4fa3d2843b3ab6aab675e510953122e4bf6372fe6.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral3
Sample
deper.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
deper.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
trickmo
http://somakeawish.com/hpuex9yu0lfad7pjoxcl
Targets
-
-
Target
4df101836ec39711255b56a4fa3d2843b3ab6aab675e510953122e4bf6372fe6
-
Size
12.6MB
-
MD5
6151b95d963680e705b7ac9c94976c2f
-
SHA1
36f8ae11c1a63aa76dfc9d40e07bcb32f47445ea
-
SHA256
4df101836ec39711255b56a4fa3d2843b3ab6aab675e510953122e4bf6372fe6
-
SHA512
5a0d50eacd5c4ee14342d9f1086b3737368e2704b0229f976de467ac95b36e8f72821a9305897b9877842adc1747bab844b06d1e9d6f5966ed8652d6b42ce5ab
-
SSDEEP
393216:jebElJRwdvKMaOe8Fpc71sgaitiFbyHzgVIZK:jRJ2v0wFeJsPi0O0QK
Score7/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
deper.apk
-
Size
8.1MB
-
MD5
2240488b9d8e26e7a7c5d76a915b08d0
-
SHA1
9484cc97cbd0538fe759e8d6f500b94df0c15ba5
-
SHA256
882a8aad8dcb9ec62e374a03553c5a7f2f0cc6db66050ca444e8d47d3d1838db
-
SHA512
5fd447c6a1584c9155366e806423caf37412ceedaaf5f84ae122d76c81fc8801a1fec86990554fe2ddbb33c0a7e76c89c2f48f83013e2de1d6a9ea4f60352bad
-
SSDEEP
196608:cpOsHIcaddwITP6wUAfm122Jl/aPkJ7wspYVoMW/:cpOA25SwUAuMZP87BquH
-
TrickMo
TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.
-
Trickmo family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Queries the mobile country code (MCC)
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2