Analysis
-
max time kernel
177s -
max time network
186s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
28-05-2024 22:03
Behavioral task
behavioral1
Sample
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
Resource
android-x64-arm64-20240514-en
General
-
Target
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654.apk
-
Size
1.1MB
-
MD5
e94de6b1d43968174b07973e1a5a4b48
-
SHA1
f87c07b6bae8577b957a79e4532891e9fdaf75c8
-
SHA256
08fdd2012458963957c02b79855de0a569d315ad5549993175dd7a892815e654
-
SHA512
3166938b629b95c500e7a5bed4718e84269d27f3475389c129c6bdf12771b2be2447bb21bf170a7afe8fcc61015462be9df9e1fbc2d467aa0ce5feeef71c69ab
-
SSDEEP
24576:qtyKsNGt2Kn3rMG/5giAjHBztt3Ioj6jbg/33cnC:qtvs8cc//BwiDjbg/gC
Malware Config
Extracted
hook
http://89.116.27.45:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.gekuwigeciyo.cigu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.gekuwigeciyo.cigu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.gekuwigeciyo.cigu -
Prevents application removal 1 TTPs 1 IoCs
Application may abuse the framework's APIs to prevent removal.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gekuwigeciyo.cigu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Processes:
com.gekuwigeciyo.cigupid process 4626 com.gekuwigeciyo.cigu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.gekuwigeciyo.cigu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.gekuwigeciyo.cigu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.gekuwigeciyo.cigu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gekuwigeciyo.cigu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests enabling of the accessibility settings. 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS com.gekuwigeciyo.cigu -
Acquires the wake lock 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.gekuwigeciyo.cigu -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.gekuwigeciyo.cigu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.gekuwigeciyo.cigu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.gekuwigeciyo.cigudescription ioc process Framework API call javax.crypto.Cipher.doFinal com.gekuwigeciyo.cigu
Processes
-
com.gekuwigeciyo.cigu1⤵
- Makes use of the framework's Accessibility service
- Prevents application removal
- Removes its main activity from the application launcher
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests enabling of the accessibility settings.
- Acquires the wake lock
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4626
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD51d2f71b0a59787705ecd47de047a5601
SHA10d0d3cc0ef871a1a5a4c60edcbf697af6bfe6a77
SHA256cf5d7e33061b74c959577e985f3a0a9d8ebc0221a7187e5dc23d16ea8b0012ed
SHA512330e286037946394a1897fea2098468f6f9ed588b4c53676d3409852849cd59631d4cf0df6fc9f69914b9603876875686418df2391b4cb8b95dacadcc26c1213
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD57a1b1d03f6b8e04d98a8e39a9efcac78
SHA144cfdfd8e2e44b0327dfa62357aff24b9ff7e9db
SHA2569d4e11e05a5770c68fa74c9ef79560cd9299c6a30b6bcc00a1ebcc0a04dacf5e
SHA512d6134c38739f81778aeffa83e0e8b7ce56133ae11e54a62321d2a82ccc5cfa4e3859c4cd0754416e4c08ccfd275e538be15de86b5ec0c14e6d89b35cd8d70e7a
-
Filesize
108KB
MD5b6a744f97050d993c4e9d0b0a1ddb86c
SHA1967787a920fc28c35d9f0a2d68921ce4d7857a7f
SHA25608bcdeb0aed78e15a613af2e7dc719e0b99a84b3052259998e96c068c6f09740
SHA512b4ad01dd8654b5bd2710455f31e559b1b54c8399e882315160312fc883f424f50861fe312eff6e3b661748d881346c1db61e209bd07f44db8c8b78e25fb5b5fa
-
Filesize
173KB
MD5a43d369fb493a6302422a0e3f4baf95b
SHA1c8b4e10ce9f6dc83b9f3627e1a371c55dfd47368
SHA256e7ad92342aee56a263e977857128d5e6fc2d9fe52b58ff51ba5ae932c3f3cb9f
SHA512047404c59d3b310d7cd3f5c758da1a87f917c6570260923e8bf911ecc67de1c5652d4e097ae05d1ce15a853de4266490352390bc8479048ce024e24cc2b6bce5