Resubmissions

27/03/2025, 13:56

250327-q86ddavmz5 10

27/03/2025, 13:16

250327-qjakeasvct 10

27/03/2025, 13:14

250327-qg4qgavjy4 10

07/03/2025, 10:37

250307-mntbjazlt8 10

General

  • Target

    cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0_2025-01-31.apk

  • Size

    8.1MB

  • Sample

    250327-qg4qgavjy4

  • MD5

    c889e75eb26de5a53531ca1d799a777e

  • SHA1

    4c9ae2c8bc9a2bc02926ee2a9a49730881907a69

  • SHA256

    cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0

  • SHA512

    cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941

  • SSDEEP

    196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2

Malware Config

Extracted

Family

trickmo

C2

http://mainworkapp.com/c

Targets

    • Target

      cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0_2025-01-31.apk

    • Size

      8.1MB

    • MD5

      c889e75eb26de5a53531ca1d799a777e

    • SHA1

      4c9ae2c8bc9a2bc02926ee2a9a49730881907a69

    • SHA256

      cfa37c111d5d86aa348a8411c39fe1c54034c437a5c15777a42638c6a9d03eb0

    • SHA512

      cbe94441f6ea06b1c9c9de0933e9755d3ac7deb3197d795570cde4d0680c87f25c8c3e34c189a8b8d898b8afa9140093dfbf731852cbc6bf02cfc03c00bd5941

    • SSDEEP

      196608:5erveQWOfAMidD+traG/iYVS9MEY2HWv7ecSb5xW:47eQqMidD+hjpVSe/2Uu2

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Trickmo family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Requests enabling of the accessibility settings.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks