General
-
Target
65400ac3a1022ec6abc081714cfac746c6e2258cad3677886c3de83e94a22edf.bin
-
Size
181KB
-
Sample
250328-1xqtnassfy
-
MD5
2420de50566946286c16158f52e22175
-
SHA1
bb6829705bdd5ee8779f320b6b03435d9e6cbeea
-
SHA256
65400ac3a1022ec6abc081714cfac746c6e2258cad3677886c3de83e94a22edf
-
SHA512
503a4bb3fb879b2e01a3be7452dff68bca425760c03a8e2c4b60eba422a055a044c32ab3cbead69f09b1f708401a592363946e5a6e3a242b675b774a1ac75c39
-
SSDEEP
3072:Vw5f3dS5kbM599UB2xzkNG1HQLHxVzLU1hyxCreG0FffoXxLe6m8pGEm9Hm4SM4y:Vw5lS5koW2xG0wLRVkMCvXxa63Dm04SY
Static task
static1
Behavioral task
behavioral1
Sample
65400ac3a1022ec6abc081714cfac746c6e2258cad3677886c3de83e94a22edf.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
65400ac3a1022ec6abc081714cfac746c6e2258cad3677886c3de83e94a22edf.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
65400ac3a1022ec6abc081714cfac746c6e2258cad3677886c3de83e94a22edf.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
65400ac3a1022ec6abc081714cfac746c6e2258cad3677886c3de83e94a22edf.bin
-
Size
181KB
-
MD5
2420de50566946286c16158f52e22175
-
SHA1
bb6829705bdd5ee8779f320b6b03435d9e6cbeea
-
SHA256
65400ac3a1022ec6abc081714cfac746c6e2258cad3677886c3de83e94a22edf
-
SHA512
503a4bb3fb879b2e01a3be7452dff68bca425760c03a8e2c4b60eba422a055a044c32ab3cbead69f09b1f708401a592363946e5a6e3a242b675b774a1ac75c39
-
SSDEEP
3072:Vw5f3dS5kbM599UB2xzkNG1HQLHxVzLU1hyxCreG0FffoXxLe6m8pGEm9Hm4SM4y:Vw5lS5koW2xG0wLRVkMCvXxa63Dm04SY
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1