Malware Analysis Report

2024-07-28 14:50

Sample ID 240609-3taz5shc56
Target VirusShare_b01ecde97d96d1e3dadd481fda2fb218
SHA256 d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123
Tags
banker collection credential_access discovery evasion impact persistence privilege_escalation
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

d12d3ae07d9de40aa38f63eff80788bb47b12103d83afe2387c0a4bca0619123

Threat Level: Shows suspicious behavior

The file VirusShare_b01ecde97d96d1e3dadd481fda2fb218 was found to be: Shows suspicious behavior.

Malicious Activity Summary

banker collection credential_access discovery evasion impact persistence privilege_escalation

Obtains sensitive information copied to the device clipboard

Reads the content of the call log.

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Makes use of the framework's foreground persistence service

Requests dangerous framework permissions

Declares broadcast receivers with permission to handle system events

Tries to add a device administrator.

Acquires the wake lock

Queries the mobile country code (MCC)

Queries the unique device ID (IMEI, MEID, IMSI)

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-09 23:47

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-09 23:47

Reported

2024-06-09 23:53

Platform

android-x64-20240603-en

Max time kernel

58s

Max time network

152s

Command Line

content.popularising.converging

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.97:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.200.36:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
GB 172.217.16.226:443 partner.googleadservices.com tcp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 142.250.200.14:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 216.58.213.1:443 afs.googleusercontent.com tcp
GB 216.58.213.1:443 afs.googleusercontent.com tcp
GB 142.250.200.46:443 tcp
GB 172.217.169.66:443 tcp
GB 142.250.187.228:443 tcp
GB 142.250.187.228:443 tcp

Files

/data/data/content.popularising.converging/databases/morning-journal

MD5 72d9c724126188704860442d2b611104
SHA1 9c07b9f6ea09ac543671aadf4a9251b93cbe3964
SHA256 5a9c6ac482264917c45ff75a9f2a3f424698605297a140e2bf727a24c024627f
SHA512 14e5c21be55a7be7802262516f8fe498e4fa1e6347b09341e54c263817c72df476bba19a16d21db913d62a0d721d19660122b678f0c52a58591c3572af1ff027

/data/data/content.popularising.converging/databases/morning

MD5 f342ee922707cc404e195fb21d0f0ad2
SHA1 ea47d02a310e17102b7f567dd760829099f8ef1c
SHA256 308052c5e9fa1352876a6b99e718056261e6640ff8b39391f21c701c4b02f3db
SHA512 f615c38979def4a91782f6beb60990a39ac08bb3b01308381f3b8a0967ecc8f5874c5c574a361ca652f7fda8ec397372c4db341b8b196efc68a5d02797e0c14f

/data/data/content.popularising.converging/databases/morning-journal

MD5 19683b6fe9ada1eb844e542d67149ad6
SHA1 8de2e930ee05d0ab13127d7feb7f0b887cfe4771
SHA256 4f6797678cea927720ecddd1675cc58099c16a401c966b9b29731626bcd4b4b7
SHA512 3446f4b7b63602129e513405e01acfafb5e9cb392a5b197d319ca32b68460f74adfdfc001c220557ca5ca4090aa39b197784976752b148921da1d31f900735f8

/data/data/content.popularising.converging/databases/morning-journal

MD5 b3ef2c9ff29d354484aab6180a4dab12
SHA1 faa40ae032e62196e07bbbce323ea424096b41a4
SHA256 f6ad9b7f0e70b0be44a2e64878ced07f1ff44cdb4f8c1166dbbfe9a1297dd947
SHA512 a1313ad174f08b46188c5a4e8f504d9765e0041cb8001899f4d32ff8b7894f7e414d0c584410e2ab21fc63c533d805dbe2d3dfb12c660235256f2e53afa04d12

/data/data/content.popularising.converging/databases/morning-journal

MD5 4adac449511ea18134c55e1dae4a88d9
SHA1 50551ef91d4c238e3306eb59cd6e67b710f41065
SHA256 9e4aa0e026222acff35739de799a3635182edc7a6825cefa06b1604a53e6a3d0
SHA512 126fa0b6949c1b032854dc2ba154b5abd795b3586a88289222efb51c53f66a05555c55c92aabeef5c3109f4ecd4498dd3e04d67cf472a4ffdfec32fd54450290

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-09 23:47

Reported

2024-06-09 23:53

Platform

android-x64-arm64-20240603-en

Max time kernel

60s

Max time network

130s

Command Line

content.popularising.converging

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.238:443 tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.97:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 172.217.169.68:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 142.250.200.34:443 partner.googleadservices.com tcp
GB 216.58.201.110:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 216.58.212.193:443 afs.googleusercontent.com tcp
GB 216.58.212.193:443 afs.googleusercontent.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 ba997d08a82e183a55a1057e24733be2
SHA1 6202fafedcdba05da554dbd6c857cf9f9ea98106
SHA256 71815b7cb73c401fbf025c08aa2cb4195951cf3164010213fad0fe511dace2d7
SHA512 133b5936d55e2e2cb4de43ac8732227535ca5d413ee1c61f1e7505786a73d717bc68525b5acc6865673159a9b0b06dfa52c25a726e3503d512963a025f38e2c8

/data/user/0/content.popularising.converging/databases/morning

MD5 52d9d91cbd410611dd36f72eeb6d7b69
SHA1 e4d44dc78321f8a9e57086888a60b50f1934c04f
SHA256 647efa202ea8da522ef34808362ee6a2eb0d75c45c9180df0c1d9dab821c51bf
SHA512 22ef33646da84d7f2501828a2576b633c31f570a2a351db0cadb0b39f7c496dc1cec5d644e5e24657b3adaa7d468e89de9491c748a4feac8e3e2cb92d1562eab

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 ea34e8ff8b2831c3623c991263c20717
SHA1 52da5f6ab16ca834f7b61493a26faac01cf6372a
SHA256 13e56188dc638093a79dbbbc73e7a2e11439fcf06b6393d76fe828614410fa45
SHA512 4380107a35530a6259bdec699b63d24c511f3dffce6d008740224933607f67494b8add9f8c315a3a33b3b560577b39045275991a814e2e785668b8ec60521cd3

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 e7bdc9df56742985b26d30a2a270ab9d
SHA1 19a38773a49a1f2bc53cb353e228208fb5261a1c
SHA256 51ee643c39140c99be9e0f78e5b912c2e1a566e5a3b64423bbde387ed654350a
SHA512 683c81d4b7b8d031a4da5dd7fa430024e2ff3978355ca25312b1da3007244cca1f557bfc1046e46cc0a4820c9c90871aabe3672aab119b82aa417d3c40e6b1fa

/data/user/0/content.popularising.converging/databases/morning-journal

MD5 861bc67bfa9ab02593fe0e378dbd0bde
SHA1 dce4f4c94d9f0221f3ae1e7279ab7bf5172850d0
SHA256 9e72ed50d847746b7acd62795010c7b69a425234087f98a7d6ad838aeb36209a
SHA512 134cae490c33485217d76511db1dbb11175e2bfad3ce7755928d22c32edc813411b090da63cb9f7070eea39a9785e658f94ec485d0d71fc1f76805e2eac9da6a

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-09 23:47

Reported

2024-06-09 23:53

Platform

android-x86-arm-20240603-en

Max time kernel

56s

Max time network

131s

Command Line

content.popularising.converging

Signatures

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Reads the content of the call log.

collection
Description Indicator Process Target
URI accessed for read content://call_log/calls N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Tries to add a device administrator.

privilege_escalation impact
Description Indicator Process Target
Intent action android.app.action.ADD_DEVICE_ADMIN N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

content.popularising.converging

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 playmarketcheck.com udp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 devicecheckingengine.com udp
US 1.1.1.1:53 mybugsense.com udp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
DE 185.53.177.53:80 playmarketcheck.com tcp
US 1.1.1.1:53 c.parkingcrew.net udp
US 1.1.1.1:53 d38psrni17bvxu.cloudfront.net udp
DE 185.53.178.30:80 c.parkingcrew.net tcp
GB 99.86.249.190:80 d38psrni17bvxu.cloudfront.net tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.180.4:80 www.google.com tcp
US 1.1.1.1:53 partner.googleadservices.com udp
GB 142.250.179.226:443 partner.googleadservices.com tcp
US 1.1.1.1:53 www.adsensecustomsearchads.com udp
GB 142.250.178.14:443 www.adsensecustomsearchads.com tcp
US 1.1.1.1:53 afs.googleusercontent.com udp
GB 142.250.179.225:443 afs.googleusercontent.com tcp
GB 142.250.179.225:443 afs.googleusercontent.com tcp
GB 142.250.187.234:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/content.popularising.converging/databases/morning-journal

MD5 376691fe71a47c681995eb297ef78c03
SHA1 3f455ac2ce941bf98441d87d482498a53912f197
SHA256 abf8ca45fb1795f0f2df1bafd32f4ea6a072dae897b7e1d6c7fac3e4141f8bf3
SHA512 24a722c1ce728d4b53d4f48951ecea8804f7e4079f01681146108ac01ab3898da6f66f55bc5a45d732104367ee000f9c271ea3922c87778b107a63b41356951e

/data/data/content.popularising.converging/databases/morning

MD5 f9d1ac176f47ccbc0ab8c012421d2659
SHA1 ce048f9f5714950047b6a129def7680d7fa04866
SHA256 ec472f2e10407e478a9dae5e5d5a3056a590ed051d925913adee741651785880
SHA512 ad053c4807535d184e9f8ead4261426f02f25916ca47510f6e6ddceb0595115669f01c727a588d287e8eca9027b2aa008df96a5754e3ac7cf549efa25c130b1a

/data/data/content.popularising.converging/databases/morning-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/content.popularising.converging/databases/morning-wal

MD5 952d6293053f250763c3515dc1ff3afc
SHA1 36bc11a60fdb4bcf48328daa0b351628ffdeb96f
SHA256 ec5bda3efaf101449d032fc2094b5f72ea254ab6aee07284bbf3eb024bdaea6f
SHA512 a1900486d758a5ec3387922ad5c967204291c1ef46c62dc283881fe896056e54dea896922c02c16083c0f89bc90134e20d5bbb1e0e26497f2e984aa51b6b7b41