Resubmissions

27/03/2025, 13:56 UTC

250327-q86ddavmz5 10

27/03/2025, 13:16 UTC

250327-qjakeasvct 10

27/03/2025, 13:14 UTC

250327-qg4qgavjy4 10

07/03/2025, 10:37 UTC

250307-mntbjazlt8 10

General

  • Target

    cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0_2025-01-31.apk

  • Size

    8.1MB

  • Sample

    250327-q86ddavmz5

  • MD5

    c889e75eb26de5a53531ca1d799a777e

  • SHA1

    4c9ae2c8bc9a2bc02926ee2a9a49730881907a69

  • SHA256

    cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0

  • SHA512

    cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941

  • SSDEEP

    196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2

Malware Config

Extracted

Family

trickmo

C2

http://mainworkapp.com/c

Targets

    • Target

      cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0_2025-01-31.apk

    • Size

      8.1MB

    • MD5

      c889e75eb26de5a53531ca1d799a777e

    • SHA1

      4c9ae2c8bc9a2bc02926ee2a9a49730881907a69

    • SHA256

      cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0

    • SHA512

      cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941

    • SSDEEP

      196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.