Analysis
-
max time kernel
179s -
max time network
169s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
01-07-2024 04:42
Behavioral task
behavioral1
Sample
bfc71fa8f865d6c05c02f4b94c8df31368abfa099f640bccafaba7c802ac3c78.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bfc71fa8f865d6c05c02f4b94c8df31368abfa099f640bccafaba7c802ac3c78.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bfc71fa8f865d6c05c02f4b94c8df31368abfa099f640bccafaba7c802ac3c78.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bfc71fa8f865d6c05c02f4b94c8df31368abfa099f640bccafaba7c802ac3c78.apk
-
Size
9.5MB
-
MD5
116e803e46bf16f43840c4c6a9e22390
-
SHA1
bd5327098de0abeea6dbbb9889631e17e655488d
-
SHA256
bfc71fa8f865d6c05c02f4b94c8df31368abfa099f640bccafaba7c802ac3c78
-
SHA512
aa1a98203f77a9e3c9f63415b5460b2a26586b89d3a1f803a8eb4afbe1f44302abdb1578f7ee1fbb732b99ded0c0a8bf2173c938efb3146ce3801b4a892cab19
-
SSDEEP
98304:dsdsCCjEgZNh/vmrc8yioDt4Cmz7zBHT/0tctbM9:dSEEebOLat4tzdwYG
Malware Config
Signatures
-
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock 1 IoCs
Processes:
humanity.holding.usrdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock humanity.holding.usr -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
humanity.holding.usrdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground humanity.holding.usr -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
humanity.holding.usrdescription ioc process Framework service call android.app.job.IJobScheduler.schedule humanity.holding.usr
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/storage/emulated/0/Config/sys/apps/log/log-2024-07-01.txtFilesize
13B
MD5de2c41a51ee9246eb1708f65b511add0
SHA12f442d634c8a18760a232c8829d4b5d74a52f074
SHA256ad2d914ca347cd1930e32f21c6d5448c34104bea181b93abc85ec518985653ab
SHA5127cdfbd001594503644e9ed80ae852f90ef9e841a8382e2eec6979e149a2c400a3b83055d205b4d1d66e1600e5127482932d5127eb5800d35a4ee5673fe34d84a
-
/storage/emulated/0/Config/sys/apps/log/log-2024-07-01.txtFilesize
29B
MD515aee203b1a8374e7d366e278b4e0ed2
SHA124bed65d9eeea98cb832877d1ce17884bdc20df5
SHA256818fb46eb59d620d3e0337c55b5a21cb00a1032597a057f9ac19169201511da7
SHA512fb1b06e60eeec99be1fc42f6b12602df1a95b710574c04764e5b1f3581665dac2d81a19d3b0fa87c32c6727555a7eb538aa73deafe3db0d2f90b07f600b1bc7c
-
/storage/emulated/0/Config/sys/apps/log/log-2024-07-01.txtFilesize
29B
MD511fa7fad5a8ff5baea05ef1d75d56402
SHA1dd9778eb3a0fa8204ad9dccb9fbf6b711cb736ba
SHA25676daa30be424486bb90569267769be8bbc28d5770b9d8b07d41372d064df9ba7
SHA5126bc8d9f1a98cd5bd6bf3f496b201a50780afce5e2b288850a303a4f0d0dfcef9bc5c0a8a750bd1d8245061482c837b1fe1244e452e8aa6f05d6e56aec81e6616