General
-
Target
d16a297b20a5a637bcba76aaddbb6359a0d7dfd53755d51b9fec327a33231ccf.bin
-
Size
3.2MB
-
Sample
250328-1w7e1ssses
-
MD5
8fdb3385a0725c192b85931cd5213b4c
-
SHA1
4f8ee6473efcbe642786404184425ec5f21e4360
-
SHA256
d16a297b20a5a637bcba76aaddbb6359a0d7dfd53755d51b9fec327a33231ccf
-
SHA512
0558be5eafb0d9f0be231cc7377e032bc6660bdb8aba0c265ebfea7fca210b693f4ae7ae5dbade3e993949f7a1950fd1a205336ba3af8aca1d1e47eb99a967da
-
SSDEEP
98304:R1BCeHq5Wp9OPui4HUk3GhDmdlhVm2wGMD7W2C4mbgjFfyQ+3CbfoB:R1ASgWpSkiDQlC2dIoB
Static task
static1
Behavioral task
behavioral1
Sample
d16a297b20a5a637bcba76aaddbb6359a0d7dfd53755d51b9fec327a33231ccf.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d16a297b20a5a637bcba76aaddbb6359a0d7dfd53755d51b9fec327a33231ccf.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
d16a297b20a5a637bcba76aaddbb6359a0d7dfd53755d51b9fec327a33231ccf.bin
-
Size
3.2MB
-
MD5
8fdb3385a0725c192b85931cd5213b4c
-
SHA1
4f8ee6473efcbe642786404184425ec5f21e4360
-
SHA256
d16a297b20a5a637bcba76aaddbb6359a0d7dfd53755d51b9fec327a33231ccf
-
SHA512
0558be5eafb0d9f0be231cc7377e032bc6660bdb8aba0c265ebfea7fca210b693f4ae7ae5dbade3e993949f7a1950fd1a205336ba3af8aca1d1e47eb99a967da
-
SSDEEP
98304:R1BCeHq5Wp9OPui4HUk3GhDmdlhVm2wGMD7W2C4mbgjFfyQ+3CbfoB:R1ASgWpSkiDQlC2dIoB
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1