Analysis
-
max time kernel
14s -
max time network
181s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
28-05-2024 22:03
Behavioral task
behavioral1
Sample
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
-
Size
1.1MB
-
MD5
e94de6b1d43968174b07973e1a5a4b48
-
SHA1
f87c07b6bae8577b957a79e4532891e9fdaf75c8
-
SHA256
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654
-
SHA512
3166938b629b95c500e7a5bed4718e84269d27f3475389c129c6bdf12771b2be2447bb21bf170a7afe8fcc61015462be9df9e1fbc2d467aa0ce5feeef71c69ab
-
SSDEEP
24576:qtyKsNGt2Kn3rMG/5giAjHBztt3Ioj6jbg/33cnC:qtvs8cc//BwiDjbg/gC
Malware Config
Extracted
hook
http://89.116.27.45:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.gekuwigeciyo.cigu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.gekuwigeciyo.cigu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.gekuwigeciyo.cigu -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gekuwigeciyo.cigu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.gekuwigeciyo.cigu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.gekuwigeciyo.cigu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.gekuwigeciyo.cigu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gekuwigeciyo.cigu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.gekuwigeciyo.cigu -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.gekuwigeciyo.cigu -
Acquires the wake lock 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.gekuwigeciyo.cigu -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.gekuwigeciyo.cigu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.gekuwigeciyo.cigu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework API call javax.crypto.Cipher.doFinal com.gekuwigeciyo.cigu
Processes
-
com.gekuwigeciyo.cigu1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Requests enabling of the accessibility settings.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4239
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5574ab49aa3b6b823a549fe412cd98c8b
SHA16ddf97e54207c815fc3ce4fd8ad6846248f83812
SHA256f86993564d976ac1f64b411ce938ab1cb7065c7d5c1fc2a73cb187b1766c0f48
SHA5128a824b515237a8a5da9200eb86af435d62015d324385cbc186682c4614bf3464c2a0c40e4656a30cfa54b59e12623a0d979987bd36dab1dbab4ad662d285fff9
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5ac88e2049f46a9ebb50ed618aef595bf
SHA1fade6026e03cd580255a41bfd312d90c328bbf56
SHA256365ce17ba5cf6f22dbc64845244df893e09309620085f2b0886e699ab5f2e802
SHA512a7c7f073c77e8c94a9bf2487938aa35d67840a6c1902f5ecbef678c6766f4719df5968767f67edf769dab37b5700f1d382caf32a8eb10e90106940c57fb23545
-
Filesize
108KB
MD504bc83bc63b8f8ff96a58f027094fa8f
SHA196afcb550d420831183aab402993c06093faba1e
SHA25622440d7e58d211c080e2692bf990a6881c1842ef2171889e500794ad5c542f9e
SHA51276ff0a19382d2f4883885096d0d284583e92185e9bde75be184d99189cd5f1f1194108238cfc397bf1319237a8d947f981cda5f443169e856e53f71b1147a163
-
Filesize
173KB
MD57960bed8a01091017ff49dc661a867aa
SHA1c5e33943ec94fd2faea0764daade32913aacb872
SHA2562d336ba8b93a854903db7330640c8ec68c5270ff039cbe230c79b767505c16ec
SHA5124dac01efc7c1e4387607a8037feb0b1707be8e6d5071278a57e64664088edf2c13f440292e6ac835563bc7b160d8faa663a53d71acff932aae1eaf584854b7b3