Malware Analysis Report

2024-07-28 14:44

Sample ID 240608-wy5lzsfb48
Target VirusShare_b01ecde97d96d1e3dadd481fda2fb218
SHA256 d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123
Tags
banker collection discovery evasion impact persistence privilege_escalation credential_access
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123

Threat Level: Shows suspicious behavior

The file VirusShare_b01ecde97d96d1e3dadd481fda2fb218 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker collection discovery evasion impact persistence privilege_escalation credential_access

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Reads the content of the call log.

Obtains sensitive information copied to the device clipboard

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

Queries the mobile country code (MCC)

Acquires the wake lock

Makes use of the framework's foreground persistence service

Tries to add a device administrator.

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-08 18:20

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 18:20

Reported

2024-06-08 18:27

Platform

android-x86-arm-20240603-en

Max time kernel

61s

Max time network

139s

Command Line

content.popularising.converging

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.201.99:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.105:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.228:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
GB 142.250.179.226:443 partner.googleadservices.com tcp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 172.217.169.14:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 142.250.200.1:443 afs.googleusercontent.com tcp
GB 142.250.200.1:443 afs.googleusercontent.com tcp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/content.popularising.converging/databases/morning-journal

MD5 1b6fb28fb8a4b5b76e43d44825ebb794
SHA1 6705f223beb989ea06bfccf7b4049b4640a7ede1
SHA256 163ab0b1f43ed9231e92c8c06c835e9b5f6a22ed1be3635bcdafb21bba2eb610
SHA512 3a653dcec649633fe4192b65edf90e42a67c0f7fff84493afac81c2cbb0e9f90aff383c47e465feec67899507e59ec274c5e0051491189beb9ca7606387c0948

/data/data/content.popularising.converging/databases/morning

MD5 f9d1ac176f47ccbc0ab8c012421d2659
SHA1 ce048f9f5714950047b6a129def7680d7fa04866
SHA256 ec472f2e10407e478a9dae5e5d5a3056a590ed051d925913adee741651785880
SHA512 ad053c4807535d184e9f8ead4261426f02f25916ca47510f6e6ddceb0595115669f01c727a588d287e8eca9027b2aa008df96a5754e3ac7cf549efa25c130b1a

/data/data/content.popularising.converging/databases/morning-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/content.popularising.converging/databases/morning-wal

MD5 e9a6283425079305762674d9134cf5b4
SHA1 4abde5186db0d9c1235a1fe4a05358dce4773a4d
SHA256 1b86291586e6f7b9a8ed65a312514bedf324ff5308d3612672d35155221b9028
SHA512 18be053a713006ec45d0f64c489f62588b3ff3759d9f2256a1860a477533a6d4e88cbec8057069dc0f62efaa51d624e4646bf3138c5eb4d9616097267d6c3e86

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-08 18:20

Reported

2024-06-08 18:27

Platform

android-x64-20240603-en

Max time network

151s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.187.228:443 tcp
GB 142.250.187.228:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.178.8:443 ssl.google-analytics.com tcp
GB 216.58.201.106:443 tcp
GB 216.58.213.14:443 tcp
GB 142.250.187.194:443 tcp
GB 142.250.178.14:443 tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-08 18:20

Reported

2024-06-08 18:27

Platform

android-x64-arm64-20240603-en

Max time kernel

61s

Max time network

135s

Command Line

content.popularising.converging

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.179.238:443 tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.190:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.180.4:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 172.217.16.226:443 partner.googleadservices.com tcp
GB 172.217.169.14:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 142.250.200.1:443 afs.googleusercontent.com tcp
GB 142.250.200.1:443 afs.googleusercontent.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 c67aae0cc9f0d08c8eccbc20663903ed
SHA1 5064cdf8b6e38dbe2253d97e1b7563f539e2d586
SHA256 b88fb7bc078e2d053c06cc84e07da49818e9c4dab8cc9ee966c6175d3c62256b
SHA512 226b67bd6c51b314ee389e39f37021f128421781474b282cd85043b44b3a18ca4472a5a336ad3fa440cd391af130cb70309eccf77e4c328e95340b59b367530c

/data/user/0/content.popularising.converging/databases/morning

MD5 52d9d91cbd410611dd36f72eeb6d7b69
SHA1 e4d44dc78321f8a9e57086888a60b50f1934c04f
SHA256 647efa202ea8da522ef34808362ee6a2eb0d75c45c9180df0c1d9dab821c51bf
SHA512 22ef33646da84d7f2501828a2576b633c31f570a2a351db0cadb0b39f7c496dc1cec5d644e5e24657b3adaa7d468e89de9491c748a4feac8e3e2cb92d1562eab

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 9200c5b5871c4c864d9ad467e08569bc
SHA1 c6117f01efea4f8c4bb23f8f36570a497d3528b4
SHA256 e669cd45eb1242c5d9ba025038ab57bd7e20c04ed9f687793fc1945e4581443a
SHA512 bdb808480dc905391535488cb7ec09aa1af4e5eb50388bce6511b841978c3e67163220cd9b49510b9085fbcd8c134f234f8f4627039181a9452962d3bb7ca56e

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 75c2ce554039d58c3f2cedb72a8c786f
SHA1 14f49ce0c01735f8ed33f9963ed34fd1b0bb4403
SHA256 07288a5eedd2e22795725f8f94921d7f3b925fc10f490ce20f9f5c0ab23152cc
SHA512 0ebabbacb0a0fa5e9f4f24d3dcd30239cc8492bffaaa50e9638fcac60f04e7c98ec0153ce9c619449cf6584aa077b09398bf291d9bf26cb84f74db1e6b831898

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 4644c71714098aa56e2df6b9d8666973
SHA1 5a76c1692118dd40cca4d369eceeb30196666eb5
SHA256 e7d17fdd55aaa348727431344baff6b3cce2b5aee6354ee35e3cbf1718a2137c
SHA512 ca51c9ca45acaddb4f959841f1e05fb7ceee81165d10f57fb0a148d229fd21d07ddc6d29a4dabdc0a4578f61fc2a6f454a59c7a6e57f383e28c0a1ecdac35f59