General
-
Target
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
-
Size
1.4MB
-
Sample
250327-byq4dav1d1
-
MD5
4b4b8078717890dee57a58a3307a9b07
-
SHA1
03c192ca1676dfccdee1f08b604da023838d16b9
-
SHA256
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869
-
SHA512
517bf0349a03032e8e8ec00643bea7a5f2a94ca4d0f12796c057869ee95ed7c46c3ed9c1f503d087700c447cc4118428b0f86e538a1377da4dd38f80fc375895
-
SSDEEP
24576:xPe1ZkNOHSf7NO9sz1jt2zdqipzYL1Y3WHTgBzhZ2n3FJsQ91oQJV3bmg2o5+Gu:c1ZzHSDNOKVEQR1ZgRhy3FJsu1oQD3bk
Static task
static1
Behavioral task
behavioral1
Sample
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
-
Size
1.4MB
-
MD5
4b4b8078717890dee57a58a3307a9b07
-
SHA1
03c192ca1676dfccdee1f08b604da023838d16b9
-
SHA256
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869
-
SHA512
517bf0349a03032e8e8ec00643bea7a5f2a94ca4d0f12796c057869ee95ed7c46c3ed9c1f503d087700c447cc4118428b0f86e538a1377da4dd38f80fc375895
-
SSDEEP
24576:xPe1ZkNOHSf7NO9sz1jt2zdqipzYL1Y3WHTgBzhZ2n3FJsQ91oQJV3bmg2o5+Gu:c1ZzHSDNOKVEQR1ZgRhy3FJsu1oQD3bk
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1