Analysis
-
max time kernel
136s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
27/03/2025, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869.apk
-
Size
1.4MB
-
MD5
4b4b8078717890dee57a58a3307a9b07
-
SHA1
03c192ca1676dfccdee1f08b604da023838d16b9
-
SHA256
ad07d44d348185db08710d8cdef6b4cff3f52e5c8ce0646654cef441dea1e869
-
SHA512
517bf0349a03032e8e8ec00643bea7a5f2a94ca4d0f12796c057869ee95ed7c46c3ed9c1f503d087700c447cc4118428b0f86e538a1377da4dd38f80fc375895
-
SSDEEP
24576:xPe1ZkNOHSf7NO9sz1jt2zdqipzYL1Y3WHTgBzhZ2n3FJsQ91oQJV3bmg2o5+Gu:c1ZzHSDNOKVEQR1ZgRhy3FJsu1oQD3bk
Malware Config
Signatures
-
pid Process 5161 cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf/app_DynamicOptDex/pJ.json 5161 cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf /data/user/0/cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf/app_DynamicOptDex/pJ.json 5161 cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf /data/user/0/cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf/app_DynamicOptDex/pJ.json 5203 cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf:cproc /data/user/0/cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf/app_DynamicOptDex/pJ.json 5203 cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf:cproc -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf:cproc -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf:cproc -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf:cproc
Processes
-
cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
PID:5161
-
cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf:cproc1⤵
- Loads dropped Dex/Jar
- Queries account information for other applications stored on the device
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:5203
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/cptbedyfutyryth.ggkimkmqmcoaaryu.qsygluabcdoutpomxgdfhtqamgf/app_DynamicOptDex/oat/pJ.json.cur.prof
Filesize138B
MD58ec63b7ba253730dcfd3515cd3485ee5
SHA13cdd945c98cf90c18d52aa9a562f1c4c05cc592b
SHA2568f020a2abf7165b3a93e53d7c2f744f19cff0f2d6dbad7c7550229ef5bb98c43
SHA51283b06e6fdaacbdbb8fa9056995affe976e42164b479eb5c6e910afc037c43c6bff7779fa8e693eaded307ec6c8362dcdeaa067f549d1e3a2061ac15554188b5d
-
Filesize
645KB
MD5f32141e4a740597e1efa3978fc3241f8
SHA15d36529560c284fb8c57405f33082ff0f59a5e92
SHA256cb909d561fb19847e1ea0c337cf03084e2aae1691c88fbbc9a42169169fb57a1
SHA51228cee7bc4aee1684186b2785c7238fca778b9a718dacc512f8b52887ccc1ef1d57a03a8c44ed991f3fb4d11c17d5aa563da862593e26165904be83245cc81c0a
-
Filesize
645KB
MD538b50103344c93e3b50742a127668788
SHA1bbdd27e2ec52728930a920d8e926a8666ddc9f0d
SHA256a441e6ad9db039e3bb8bceb54aae8c038566803732bad16711eafeb1ff15d3f6
SHA512c8fce56030e44458e6ca9f6362ef2ea08fe5ef1855558b217f79a2bd06d08957627bbab1fc609d65a8d1a79b7e3ffb97037edc1e96d44a67874a67990fc01445