Malware Analysis Report

2024-07-28 14:45

Sample ID 240608-vx7jhsef22
Target VirusShare_b01ecde97d96d1e3dadd481fda2fb218
SHA256 d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123
Tags
banker collection discovery evasion impact persistence privilege_escalation credential_access
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123

Threat Level: Shows suspicious behavior

The file VirusShare_b01ecde97d96d1e3dadd481fda2fb218 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker collection discovery evasion impact persistence privilege_escalation credential_access

Obtains sensitive information copied to the device clipboard

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Reads the content of the call log.

Makes use of the framework's foreground persistence service

Requests dangerous framework permissions

Declares broadcast receivers with permission to handle system events

Tries to add a device administrator.

Queries the mobile country code (MCC)

Acquires the wake lock

Queries the unique device ID (IMEI, MEID, IMSI)

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-08 17:23

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 17:23

Reported

2024-06-08 17:29

Platform

android-x86-arm-20240603-en

Max time kernel

58s

Max time network

132s

Command Line

content.popularising.converging

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
GB 172.217.169.10:443 tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.202:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.228:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
GB 142.250.179.226:443 partner.googleadservices.com tcp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 142.250.178.14:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 142.250.178.1:443 afs.googleusercontent.com tcp
GB 142.250.178.1:443 afs.googleusercontent.com tcp

Files

/data/data/content.popularising.converging/databases/morning-journal

MD5 eadafa3bcdc8b3e69959256fe63ea916
SHA1 313d890ca48c801ebf66efe47bcf3492869a98b0
SHA256 88ec6a84c672335c89fdbc2c777c8126df2005ae08353b61513f120964310f38
SHA512 fd66f8c2cc0c34f09f611b88d36c16c4009e133ed55d325a93f363dc25519e6a8ce64dbfd2425af1300883188df9d2a6b22b7a21c4a7a40d8323eeefeecd9bfd

/data/data/content.popularising.converging/databases/morning

MD5 f9d1ac176f47ccbc0ab8c012421d2659
SHA1 ce048f9f5714950047b6a129def7680d7fa04866
SHA256 ec472f2e10407e478a9dae5e5d5a3056a590ed051d925913adee741651785880
SHA512 ad053c4807535d184e9f8ead4261426f02f25916ca47510f6e6ddceb0595115669f01c727a588d287e8eca9027b2aa008df96a5754e3ac7cf549efa25c130b1a

/data/data/content.popularising.converging/databases/morning-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/content.popularising.converging/databases/morning-wal

MD5 d42af8bd3c039adb9f7adac92b83e2e7
SHA1 568869d7be7a1567f3dbf255bfe903476d8f00cc
SHA256 cef6d2f4507fdc2d494530553deb41861080b566ffc9eb5f8df1ce4c2210e34e
SHA512 c2724102af7a5dde7e01044227471ae466a4ea8a286239178fad554aac47b69df76f45dbd33a7e17e995422195d20c02b4401158fc88d5a385315add2657f30f

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-08 17:23

Reported

2024-06-08 17:29

Platform

android-x64-20240603-en

Max time kernel

59s

Max time network

132s

Command Line

content.popularising.converging

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 playmarketcheck.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.212.200:443 ssl.google-analytics.com tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
GB 172.217.16.234:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
GB 172.217.16.234:443 semanticlocation-pa.googleapis.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.105:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.201.100:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
GB 142.250.179.226:443 partner.googleadservices.com tcp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 216.58.212.206:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 142.250.179.225:443 afs.googleusercontent.com tcp
GB 142.250.179.225:443 afs.googleusercontent.com tcp
GB 142.250.200.46:443 tcp
GB 172.217.169.66:443 tcp
GB 142.250.187.228:443 tcp
GB 142.250.187.228:443 tcp

Files

/data/data/content.popularising.converging/databases/morning-journal

MD5 7811d365eab155d9262e5b0c5927f8f0
SHA1 c83a187fa1daa1f37621172211180c5a3d2736cb
SHA256 29605a8ef075d8ccc779e906f3e57f2a593ec98ca01c6a9c1b02c9394870fb5e
SHA512 5b9da502e4fb877b9b71c44894c40cb2171e8388707018406fc0c07dbc372b81e7b8338f5f246982dd81a50f98afd6c32ce2420fc5ba5fcd01207063057bcb32

/data/data/content.popularising.converging/databases/morning

MD5 f342ee922707cc404e195fb21d0f0ad2
SHA1 ea47d02a310e17102b7f567dd760829099f8ef1c
SHA256 308052c5e9fa1352876a6b99e718056261e6640ff8b39391f21c701c4b02f3db
SHA512 f615c38979def4a91782f6beb60990a39ac08bb3b01308381f3b8a0967ecc8f5874c5c574a361ca652f7fda8ec397372c4db341b8b196efc68a5d02797e0c14f

/data/data/content.popularising.converging/databases/morning-journal

MD5 49cd34bb8c3ddf53702067b0313c19da
SHA1 83318d2807a1e3583b1a3299ea1e702d332628f5
SHA256 0979b6a3fd08b74cba321547d41f87ba9ba88a9557db8f3c062f415401cda28b
SHA512 859481dbaebf7d936a8116be0a76f4c1141622bec3bc9dd222cecc2813035955bb06c2701ee8c1b64718f47fa77ed4933c505a296dbe953f04ebe5d80307c8e2

/data/data/content.popularising.converging/databases/morning-journal

MD5 0820cb462dab97297d0acdfa5be25ed2
SHA1 193b822f97f6722d0da34baa59dbf8ad399af08e
SHA256 f440fd743bcbe5fe5cf442d9fd603d0781c31d269d7de483acf06693aff965f4
SHA512 66094b008ed097d834b9867031be02b77b722b5145bd6cfea723c4464bc61e75713f3aed7e677137f03156246712644399ebff82ffb557fa748f4e088359025d

/data/data/content.popularising.converging/databases/morning-journal

MD5 7355d3bc06fb9408a8462d5bb6e1f84b
SHA1 04ce72ac8af9649a8c046e586525bc7df6300c59
SHA256 c243e99b9236b0c14df913a10fce362d728b40e40bf600c0093d60064439e21a
SHA512 aea5dd5dd9b79dd418f3477d27b8c25bab548c741e27812ffa46fdea909d8855bc31b3e1eb1ab1c0f69b24f9a784d41abbf283a61da5ff047e57d3bab15ff8fd

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-08 17:23

Reported

2024-06-08 17:29

Platform

android-x64-arm64-20240603-en

Max time kernel

60s

Max time network

183s

Command Line

content.popularising.converging

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.97:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.180.4:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 142.250.179.226:443 partner.googleadservices.com tcp
GB 142.250.180.14:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 142.250.180.1:443 afs.googleusercontent.com tcp
GB 142.250.180.1:443 afs.googleusercontent.com tcp
GB 216.58.212.196:443 tcp
GB 216.58.212.196:443 tcp
GB 142.250.180.14:443 www.adsensecustomsearchads.com tcp
GB 216.58.212.194:443 tcp

Files

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 f088473ca96fd6a665ca185d47dae5e2
SHA1 ba3649b29fab58009318db32e0be77211d83a8b6
SHA256 cd546c5b8b7741b842b66232af2a83acf8137f33653afaa8a204568dd9bd9c5f
SHA512 bb627adbcc0c446e831bd01efe17554dd5eb558f1e942b7a79ec6eb38534451dda0b11bdaf4ed79bf4bb3360262c239d3375e818bd1dc3ed149bedd925f64cb7

/data/user/0/content.popularising.converging/databases/morning

MD5 52d9d91cbd410611dd36f72eeb6d7b69
SHA1 e4d44dc78321f8a9e57086888a60b50f1934c04f
SHA256 647efa202ea8da522ef34808362ee6a2eb0d75c45c9180df0c1d9dab821c51bf
SHA512 22ef33646da84d7f2501828a2576b633c31f570a2a351db0cadb0b39f7c496dc1cec5d644e5e24657b3adaa7d468e89de9491c748a4feac8e3e2cb92d1562eab

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 6c8002e31a8710d9bc6af693ef53901d
SHA1 61a509c3042682ce0d5df44049629c040744a374
SHA256 e4745406f62fd2892e26e86a38dde5ef37663d4a48b9ad1ab1844313a71bf08d
SHA512 67965f8279f2b203da4752e9257ab7ace0af9211658e53bfcba6c848f96c7fd4da4b40024999c6f8868549151ad4038c916b4849605583bcf925181fd155341d

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 1d6a321b53c366ab3341daf895647303
SHA1 dab22f7bb55baf81609ddfbaad408c2c9f6433b8
SHA256 8125ae96f7080c9dff8ecf7acb3e045cd2f821be4b2db5c22d367b18c8c227b6
SHA512 2e5b0308b945b2d2e5a98808cb39ce5d1a1cc6023074d88e13939dd62974392f1da85504de24ea44fecb41e01bfe3d3020c43264a491d451c936eb9917e5ddad

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 484f7e56135600e15395c7c3f6df33d3
SHA1 8341e3940abe0bc2cb13d4a8d17101be2db0ead6
SHA256 525cc512afca60389139bc3c589a4b617dbf4e855172bfd3b4a0c0fbbbab52d7
SHA512 bee9509a05c7161d597b1a572ccee7df74dd15563a72ae24a784a4416e1bd3145b2b3729981f0be9ca22ba0caf4a1160602bbe964de372b98c878a6e572e4e57