Malware Analysis Report

2024-10-18 21:32

Sample ID 240521-gqqqjagh38
Target malshell.apk
SHA256 d17c86b2b2a47182cf2dceac24047c360c74a014c30489863ce950192efb59e7
Tags
metasploit
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d17c86b2b2a47182cf2dceac24047c360c74a014c30489863ce950192efb59e7

Threat Level: Known bad

The file malshell.apk was found to be: Known bad.

Malicious Activity Summary

metasploit

Metasploit family

Metasploit payload

Requests dangerous framework permissions

Acquires the wake lock

Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-21 06:00

Signatures

Metasploit family

metasploit

Metasploit payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 06:00

Reported

2024-05-21 07:09

Platform

android-x86-arm-20240514-en

Max time kernel

7s

Max time network

180s

Command Line

com.metasploit.stage

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A 8.tcp.ngrok.io N/A N/A
N/A 8.tcp.ngrok.io N/A N/A
N/A 8.tcp.ngrok.io N/A N/A

Processes

com.metasploit.stage

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.169.14:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 172.217.16.228:443 www.google.com tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
GB 142.250.178.3:443 tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 06:00

Reported

2024-05-21 07:09

Platform

android-x64-20240514-en

Max time kernel

7s

Max time network

182s

Command Line

com.metasploit.stage

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A 8.tcp.ngrok.io N/A N/A
N/A 8.tcp.ngrok.io N/A N/A
N/A 8.tcp.ngrok.io N/A N/A

Processes

com.metasploit.stage

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
GB 172.217.169.14:443 tcp
GB 172.217.16.226:443 tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp
US 13.58.157.220:12222 8.tcp.ngrok.io tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-21 06:00

Reported

2024-05-21 07:09

Platform

android-x64-arm64-20240514-en

Max time kernel

7s

Max time network

184s

Command Line

com.metasploit.stage

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A 8.tcp.ngrok.io N/A N/A
N/A 8.tcp.ngrok.io N/A N/A
N/A 8.tcp.ngrok.io N/A N/A

Processes

com.metasploit.stage

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.201.106:443 tcp
GB 216.58.201.106:443 tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.14:443 android.apis.google.com tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 3.19.130.43:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 3.142.129.56:12222 8.tcp.ngrok.io tcp
US 1.1.1.1:53 8.tcp.ngrok.io udp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp
US 3.142.81.166:12222 8.tcp.ngrok.io tcp

Files

N/A