Resubmissions

27/03/2025, 10:40

250327-mq2exssqt4 10

27/03/2025, 08:05

250327-jzbzvayyhz 10

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    27/03/2025, 08:05

General

  • Target

    rex.apk

  • Size

    7.8MB

  • MD5

    5e6c199096fb378865454af7fe158a38

  • SHA1

    9be62d38f7fdf15f2841c442f57e74768bb9c264

  • SHA256

    12b59f6d4c21c1b4ca25dab0618ed5ffb57ad8f9c7ba7b731ea0f8b2aac251cc

  • SHA512

    2c93b6faa6f6fafe786f7ba6236ed8648a3fc599c6e6c72921633195649daafc41eac05aa3a019e84a1863e054ea28c87b06635b2cfc92f5e8f784ae2ab2c67a

  • SSDEEP

    196608:8cNnc/cvcDPpG1cscgA0TIrsE+5zFKKpEC6iOchpWy0e:1Nc0EDhGKFgA0krs7T9CLe

Malware Config

Signatures

  • Copybara

    Copybara is an Android banking trojan first seen in November 2021.

  • Copybara family
  • Copybara payload 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.tencent.mm
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Checks CPU information
    • Checks memory information
    PID:4484

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.tencent.mm/app_mph_dex/apk.crazy-v1.AndroidManifest.xml

    Filesize

    9.0MB

    MD5

    e749ea3b2deac728d2b2781ee0ae2a53

    SHA1

    d053c42e6be484c7ca1ef5bc18bcf3ea2492a305

    SHA256

    9d5d7fbeb153f61245f72a755083e7bd75ce6bd024b418946dbcd54cb99bb612

    SHA512

    747b7fcdd64140ce902b74771bde156edec71a787007f9cf53323bb6b63ec7f8471272ca433ae4c5305e1e6268419c7203de8c6bfaaf258d756af9d20bb91631

  • /data/user/0/com.tencent.mm/files/db.db

    Filesize

    12KB

    MD5

    256df4f1f534234b1d510cd7ccd71dab

    SHA1

    b7d93f7875c80eb6d55ca84ed3def780b6a84759

    SHA256

    8aad7daf3faa9bce66f44dabe11613afeb8731704e93112d890573b9d909d5e3

    SHA512

    3768be2a2f53ce428473f1d92c55342240994ad92fe6af315ba9322239a267fc059c7f0dd8f156c395dcfa5841c257c5158c7fabd28b6ef342fcc2e01b709ffc

  • /data/user/0/com.tencent.mm/files/loading.gif

    Filesize

    121KB

    MD5

    7b38720a0352dffa26411726c72dd2b0

    SHA1

    b15e687f42abcdc12427f146a3115ef2259211f8

    SHA256

    2013f490d45638cada331b3474ed65b9a43cec60da773accc98332e58c06336d

    SHA512

    0df28f87da4f9beb3ca8c108f54021a2a1a1434771abbb5ba67a2736097f2287b05e5220a33e92c42ee13ecae1144714a422b986763712794f69e65bc44c83e3

  • /data/user/0/com.tencent.mm/files/txtscreensize.txt

    Filesize

    12B

    MD5

    537438d91dbef572a95aa871bb30aa0d

    SHA1

    500aeb9d5565b952331daa14b003fde37222fa3d

    SHA256

    a36ed0a8dff4f2fe73de580adbd8aa4363b8537916b6deed4d53446d9a10a630

    SHA512

    596b39f360186789c7bd94841ce85e45f1c60f0098dfb33c6dc2c341e88881a3728d6673a81e3b10d26888b3037bd7aa2f17a50fd6e6ec89f773dbe0ea2ee11e