Malware Analysis Report

2024-07-28 14:53

Sample ID 240608-1ks39agg5t
Target VirusShare_b01ecde97d96d1e3dadd481fda2fb218
SHA256 d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123
Tags
banker collection discovery evasion impact persistence privilege_escalation credential_access
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123

Threat Level: Shows suspicious behavior

The file VirusShare_b01ecde97d96d1e3dadd481fda2fb218 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker collection discovery evasion impact persistence privilege_escalation credential_access

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Reads the content of the call log.

Obtains sensitive information copied to the device clipboard

Acquires the wake lock

Requests dangerous framework permissions

Makes use of the framework's foreground persistence service

Queries the unique device ID (IMEI, MEID, IMSI)

Queries the mobile country code (MCC)

Tries to add a device administrator.

Declares broadcast receivers with permission to handle system events

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-08 21:42

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 21:42

Reported

2024-06-08 21:46

Platform

android-x86-arm-20240603-en

Max time kernel

61s

Max time network

148s

Command Line

content.popularising.converging

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 playmarketcheck.com udp
GB 172.217.169.42:443 tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.202:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 172.217.16.228:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
GB 216.58.204.66:443 partner.googleadservices.com tcp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 216.58.212.206:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 142.250.187.193:443 afs.googleusercontent.com tcp
GB 142.250.187.193:443 afs.googleusercontent.com tcp
GB 216.58.201.110:443 tcp
GB 142.250.187.194:443 tcp

Files

/data/data/content.popularising.converging/databases/morning-journal

MD5 c7fec81950e32626468139d75821bb06
SHA1 013aa56d45d157d254f56665208f02d7fa9265fe
SHA256 98a81ac57feed62aa2111a8d8229c7ae03b65f21b261dd1c642a16dbaa65d23a
SHA512 536611f45490d937bd7f3934b6c2642aab01cd65fba85dcac3c94c48912755a5145b7c7d3beb08de38cbb77d81eca082af056ba2a675ea775f97f09ec1c80d7a

/data/data/content.popularising.converging/databases/morning

MD5 f9d1ac176f47ccbc0ab8c012421d2659
SHA1 ce048f9f5714950047b6a129def7680d7fa04866
SHA256 ec472f2e10407e478a9dae5e5d5a3056a590ed051d925913adee741651785880
SHA512 ad053c4807535d184e9f8ead4261426f02f25916ca47510f6e6ddceb0595115669f01c727a588d287e8eca9027b2aa008df96a5754e3ac7cf549efa25c130b1a

/data/data/content.popularising.converging/databases/morning-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/content.popularising.converging/databases/morning-wal

MD5 85f5103b5dfd6348fe7e0a930a71254c
SHA1 c6afa3b765689b825535b1d987499f1c1c2b2dcd
SHA256 a3aa121de7f10d67f50837791a4366ea554d48eebf8297ddff0495611b4cf5a4
SHA512 7406784f6f637c7deb51d503be78a3b4ca0935f21b5f76066a8dc7c0fab1696aa7a088e739be19051d833df1a1ba170cf32f5b2d7f5a113ee6c6a53e469a0c5b

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-08 21:42

Reported

2024-06-08 21:46

Platform

android-x64-20240603-en

Max time kernel

64s

Max time network

131s

Command Line

content.popularising.converging

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
GB 142.250.187.202:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
GB 216.58.201.106:443 semanticlocation-pa.googleapis.com tcp
GB 216.58.213.14:443 tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
GB 142.250.187.194:443 tcp
GB 142.250.178.14:443 tcp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.97:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.180.4:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
GB 142.250.200.34:443 partner.googleadservices.com tcp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 216.58.212.206:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 172.217.16.225:443 afs.googleusercontent.com tcp
GB 172.217.16.225:443 afs.googleusercontent.com tcp
GB 142.250.187.228:443 tcp
GB 142.250.187.228:443 tcp

Files

/data/data/content.popularising.converging/databases/morning-journal

MD5 29de9bbfc779122cba2b8c3ae60c6cc2
SHA1 6f0dcf9cc1d2a64bd207c2c9fccf576aa5ba279d
SHA256 e9f219f42546d377b0544d38b447149f2ec1eafe1d8e9c1c2e9295994099220a
SHA512 91e151f5070ba3bedadd788ed6015d68a79129642d9c6572efeb9488cd9d9961101199ad9169f3dd62e0bf5d8861dee6bedef52bc85b553d57a861b563e64b29

/data/data/content.popularising.converging/databases/morning

MD5 f342ee922707cc404e195fb21d0f0ad2
SHA1 ea47d02a310e17102b7f567dd760829099f8ef1c
SHA256 308052c5e9fa1352876a6b99e718056261e6640ff8b39391f21c701c4b02f3db
SHA512 f615c38979def4a91782f6beb60990a39ac08bb3b01308381f3b8a0967ecc8f5874c5c574a361ca652f7fda8ec397372c4db341b8b196efc68a5d02797e0c14f

/data/data/content.popularising.converging/databases/morning-journal

MD5 78e1eec0cf07c80020c597eb3a3cffbc
SHA1 e763e88592b86cc617a2203705366890a4c46cab
SHA256 ea4927d9ae59ca0ec5b0ef916853df6b7ff649cb6658cf4809e1da64776cf2d9
SHA512 155958d6cd59a0ebe896155b7373d1ac33970a504d24f02c995df1568222c012e278c5f5ae9c594719d86266318783880d40031555d64f21e3a301778510f84a

/data/data/content.popularising.converging/databases/morning-journal

MD5 58021b88e3bf52e89d694988797362a3
SHA1 96b60a45e53fd23bb1c104e41c3c915e6b7ccba1
SHA256 3417cfe6b79b7000fa5d7d5a8b1fd73fdb0d30a07898edeca11f87c81a836088
SHA512 eab54d84a4b0c4aed9b41cab195a80f8384f31decf1615d1329dbf8e617325e90376a1d2510d29a857f30f4cb075c51325944f79331f8e52e102cfec40eb3a6c

/data/data/content.popularising.converging/databases/morning-journal

MD5 dd4aaa3d5030e9b55ccf19bae82c6045
SHA1 ae3dde4375eda37e26888d084292f357d8332fa2
SHA256 5a32ca7f520834e33e398304bcc0db044e79c7570af0b59d4816fcb92cc00767
SHA512 674c021920185c38236c2d237ced9628a205122a0dccf66f2570f790f4c17fe2d7f0793263ae4388701a8fc4bb6884e0f26a2cd2004a9f7670cf615bd03ca695

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-08 21:42

Reported

2024-06-08 21:46

Platform

android-x64-arm64-20240603-en

Max time kernel

60s

Max time network

157s

Command Line

content.popularising.converging

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
GB 142.250.187.238:443 tcp
GB 142.250.187.238:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.212.202:443 tcp
GB 216.58.212.202:443 tcp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.200:443 ssl.google-analytics.com tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.97:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.196:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 172.217.16.226:443 partner.googleadservices.com tcp
GB 216.58.201.110:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 172.217.169.1:443 afs.googleusercontent.com tcp
GB 172.217.169.1:443 afs.googleusercontent.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 7d6827ec35fd151e4bc4869cf8fe9c60
SHA1 130a07f91df151c73f2e1cfbaa95b8255d48bbd4
SHA256 95accacb5e1ea293d5807940b86f1faa72d439377a7c08a6d6bd226c0d04480f
SHA512 5e65a853f9529b19fd615bdd7778254b4b9a24bcf1c788ea5988c75e47df1e0a8aa750e409712a5c9224224bff045c22c7297785d50ddde1f85be7eaee200207

/data/user/0/content.popularising.converging/databases/morning

MD5 52d9d91cbd410611dd36f72eeb6d7b69
SHA1 e4d44dc78321f8a9e57086888a60b50f1934c04f
SHA256 647efa202ea8da522ef34808362ee6a2eb0d75c45c9180df0c1d9dab821c51bf
SHA512 22ef33646da84d7f2501828a2576b633c31f570a2a351db0cadb0b39f7c496dc1cec5d644e5e24657b3adaa7d468e89de9491c748a4feac8e3e2cb92d1562eab

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 b5acfa78496a6bfa0ee018d1e921d803
SHA1 b19f54ae15ae34759a58d67f1ee0a9fe7f5cbba1
SHA256 33b3054c0996b08ff7906dea3db91e1bbc19188bc3e2579af9fc94809396c1d9
SHA512 f1f792d43c6869854fb0a688c7245bbe99d96a5d218a13d974b77cb332eb535b85f10248e888130c4a0787a3d25192d395145034b5c7dc3863ea1afff8de05db

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 d57ef26a35a3a837311f31aabe0c5f74
SHA1 0cef4ca6bd72fc9f780d2940c9fc553ac7e76633
SHA256 5b71fa70862e8edd39418381ea6e3e33da2d75f5db0ae194aba00b5bb2e6079a
SHA512 b2a35417cc0fd5aaf9e9449717931a8792bec122fa637aa7329c070c2304dd2d75e1cec9050b90d3aaae55e8315dda5ef4a7a5adf09dd14d6248c85a77a97ff1

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 c76e79638232cb07d446dc5d715cb238
SHA1 15ec91b3f354c68037102c11bdf2cb8e3c967b3f
SHA256 fe6cfde6b7c278c987faa91a4195c85cef6639b77ed88b0a44f0f4a33e45fd9c
SHA512 31598aca051097d0b963a5f1531a14befcbee755cb664b7fa5e36f66b14ebce4c1d46013dbe6fd933ab256a8ef7159319addddae59b2b8b9280c18f208c035fd