Analysis
-
max time kernel
69s -
max time network
75s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
22-05-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
mgsProMob_P500_V1_debug.apk
Resource
android-x86-arm-20240514-en
General
-
Target
mgsProMob_P500_V1_debug.apk
-
Size
38.5MB
-
MD5
903d55966ea7dbb64c07825f7db10125
-
SHA1
fca36f616edc9e2f58748b2a8408121a2041e53a
-
SHA256
721fc346f0bcbb374027d049a954ef6901fdaec387ae441263175d49c51c2750
-
SHA512
83e4d44d880bb561885d77c8f579431ff5c2c5d06152237d9bc6b5a564a63f7ba785c3e61b69e7f226c0cdf23362b610691219c36e7f85aabf84076a1487c3d4
-
SSDEEP
786432:USjo3Of7Xl4u2/0wjcfm+bRqJtkTkijwkCeMRrYRAEzRXl0jwh+bRqJ8z:UO5z1Z2/0ccDNqJuo67CeMiAEf4zNqJm
Malware Config
Signatures
-
Checks Android system properties for emulator presence. 1 TTPs 3 IoCs
Processes:
com.android.mgsmobdescription ioc process Accessed system property key: ro.product.name com.android.mgsmob Accessed system property key: ro.product.device com.android.mgsmob Accessed system property key: ro.product.model com.android.mgsmob -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.android.mgsmobdescription ioc process File opened for read /proc/cpuinfo com.android.mgsmob -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.android.mgsmobdescription ioc process File opened for read /proc/meminfo com.android.mgsmob -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.android.mgsmobdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.android.mgsmob -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.android.mgsmobdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.android.mgsmob -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 1.0.0.1 Destination IP 9.9.9.9 -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.android.mgsmobdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.android.mgsmob -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.android.mgsmobdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.android.mgsmob
Processes
-
com.android.mgsmob1⤵
- Checks Android system properties for emulator presence.
- Checks CPU information
- Checks memory information
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4254 -
getprop debug.dns.enable2⤵PID:4453
-
getprop debug.dns.filter2⤵PID:4472
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.android.mgsmob/databases/BBDatabase.db-journalFilesize
512B
MD58d6929af421caaf69f725880a20d57b7
SHA126923c20b6e5bd0a2b16e192ec9b9249476bf1cf
SHA256aba76cc7c2f9b63b0311260adc1de29f60910f17ca501db78a93538eaa3630de
SHA512ff8cbf29e3d7c3dff4bf2789e4f3933316e9b586f11ae46d01011f862d1f13cb961dd442e85ed8fafa0458204dabf70e8daa595a63e142eb6408563da7c1f864
-
/data/data/com.android.mgsmob/databases/BBDatabase.db-walFilesize
60KB
MD556000b09be3bc13b98fd98559760adcb
SHA10048c691c5fa3436cffefce6509a96368f5e343a
SHA256c4bd9acf0e1750a97f8d7686a3c5652aa160ea2e8f040381204d47b506c0448f
SHA512af85b80af22045c6a378023d84efcab9b08fd6c0ce6a9059f7da551572b4f0cd226fde231b3c5e099cf078b4614567fc8f2de89d06e2b5dfbeb420129ef0d93d
-
/data/data/com.android.mgsmob/databases/addbFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/data/com.android.mgsmob/databases/addb-journalFilesize
512B
MD5377ad20deec151e09075186c8167ae93
SHA160b1a8ef7a4ed332c07d4b53479b4b4c76c4a583
SHA256e1c642da6f3052bce666db3acbc9b5bdb6f26adbc5b3185278687b80b29b020f
SHA5120386cfb5c2c8e45356733b379f221fc321890451ce499e45f38b9b22b3311bbe4fdf3f97030e59062d42da9ea6fe9e5ef0420f14f12a5a87dfbafb8ca7afaa12
-
/data/data/com.android.mgsmob/databases/addb-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.android.mgsmob/databases/addb-walFilesize
32KB
MD5a5792eda642695b250533ce87d2d67b0
SHA15efade16d23f23fd1fa3daaa90ad682454f2f4af
SHA256b83cd3c3b9f4193c731e48e3a3e38d3c378c190930cd3e722aac9ddd6610b5d5
SHA512b6910d45607115cc93dba8a34f76242048ae20863a7ecfc7594c8ccb553f1baf156bbdf2ec3a45c9af4b5e66c354dd8c8564e72c539f04015718c068e26e4bd6
-
/data/data/com.android.mgsmob/files/cacert.pemFilesize
221KB
MD5be2b0736ea029fff398559fa7df4e646
SHA170fc16edf57e15567cd70f4d919c93dbbb072dbc
SHA256c05a79296d61e3b2a2ebaf5af476839b976d69a5acb6f581a667e60e681049a2
SHA512c6dd35579b664e37721d470b2e3c4d8ab681a1bc32c4994b1ca9e5e042fbc21a78f4a3ba775d01b919f8dbbaad08f9eecf6f8dbb7f0224fb72b819b615993011