Malware Analysis Report

2024-07-28 14:45

Sample ID 240602-3nh4kace44
Target ace89b1fc51ca81200f9bae2a2616f78a129ba1b79ce412061c604165bf415c4.bin
SHA256 ace89b1fc51ca81200f9bae2a2616f78a129ba1b79ce412061c604165bf415c4
Tags
discovery evasion execution impact persistence privilege_escalation stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

ace89b1fc51ca81200f9bae2a2616f78a129ba1b79ce412061c604165bf415c4

Threat Level: Likely malicious

The file ace89b1fc51ca81200f9bae2a2616f78a129ba1b79ce412061c604165bf415c4.bin was found to be: Likely malicious.

Malicious Activity Summary

discovery evasion execution impact persistence privilege_escalation stealth trojan

Removes its main activity from the application launcher

Makes use of the framework's foreground persistence service

Loads dropped Dex/Jar

Tries to add a device administrator.

Queries the phone number (MSISDN for GSM devices)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks if the internet connection is available

Schedules tasks to execute at a specified time

Declares broadcast receivers with permission to handle system events

Acquires the wake lock

Requests dangerous framework permissions

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-02 23:39

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A
Allows the app to answer an incoming phone call. android.permission.ANSWER_PHONE_CALLS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 23:39

Reported

2024-06-02 23:42

Platform

android-x86-arm-20240514-en

Max time kernel

178s

Max time network

169s

Command Line

com.rRIotMAa

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/data/com.rRIotMAa/b.zip N/A N/A
N/A /data/data/com.rRIotMAa/b.zip N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.rRIotMAa

Network

Country Destination Domain Proto
GB 142.250.187.195:443 tcp
N/A 224.0.0.251:5353 udp
TW 114.36.188.181:8081 tcp
KR 103.13.221.63:80 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
TW 114.36.188.181:8081 tcp

Files

/data/data/com.rRIotMAa/b.zip

MD5 ce03b281ba8fffdbf39e084ede6060c7
SHA1 b6d9fd2dc5250103343bc560c4c967bedc212b03
SHA256 de93038ba0c8daca1eb00f8d1d8b9c23c3aec291ac814720d5e3d4d094f03b1a
SHA512 6d94d391735dde10f3fd2d7f104abcf55fe18c76571c6f6fee2ba4cb7672bbcd2f78742e59f39369f02a05c2b41b72b1a24701414448b59c5504dfcd2c1b143c

/data/data/com.rRIotMAa/files/config

MD5 ba8013e3fa425ebbc87dbc26a4254f45
SHA1 3b59613cdca1d38c97d87248b51c4660217feed8
SHA256 65c369c6b2ed22be3a7761e16bcee677b872ac03b154778c26c26bf12c60de30
SHA512 be34891129fb4352bc461d5e7aa57b81f96138d52b99811789aeb8dec20bd23168745c466ab5551eaeaacbef6d3d1960e4f597133d0a4d96cf3e2a59459a603e