Malware Analysis Report

2024-09-09 16:19

Sample ID 240611-sqvv2a1gjb
Target sharkbot.apk
SHA256 dc33197e20539aa65e89c1a1039007c57ee70624815f7e4976dab0686e93a5d5
Tags
collection credential_access discovery evasion execution impact persistence
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

dc33197e20539aa65e89c1a1039007c57ee70624815f7e4976dab0686e93a5d5

Threat Level: Likely malicious

The file sharkbot.apk was found to be: Likely malicious.

Malicious Activity Summary

collection credential_access discovery evasion execution impact persistence

Checks if the Android device is rooted.

Loads dropped Dex/Jar

Obtains sensitive information copied to the device clipboard

Queries information about running processes on the device

Reads information about phone network operator.

Declares services with permission to bind to the system

Queries information about active data network

Requests dangerous framework permissions

Makes use of the framework's foreground persistence service

Queries the mobile country code (MCC)

Schedules tasks to execute at a specified time

Registers a broadcast receiver at runtime (usually for listening for system events)

Uses Crypto APIs (Might try to encrypt user data)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-11 15:20

Signatures

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-11 15:20

Reported

2024-06-11 15:22

Platform

android-33-x64-arm64-20240611-en

Max time kernel

26s

Max time network

33s

Command Line

com.superlimpiador.acelerador

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/app/Superuser.apk N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /system_ext/framework/androidx.window.extensions.jar N/A N/A
N/A /system_ext/framework/androidx.window.extensions.jar N/A N/A
N/A /system_ext/framework/androidx.window.sidecar.jar N/A N/A
N/A /system_ext/framework/androidx.window.sidecar.jar N/A N/A
N/A /data/user/0/com.superlimpiador.acelerador/cache/1664557424545.jar N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.superlimpiador.acelerador

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.187.228:443 udp
GB 142.250.187.228:443 tcp
US 216.239.38.133:443 tcp
US 45.60.1.206:443 tcp
US 1.1.1.1:53 googleads.g.doubleclick.net udp
GB 216.58.201.98:443 googleads.g.doubleclick.net tcp
GB 216.58.201.98:443 googleads.g.doubleclick.net udp
GB 216.58.201.98:443 googleads.g.doubleclick.net tcp
GB 216.58.201.98:443 googleads.g.doubleclick.net udp
GB 216.58.201.98:443 googleads.g.doubleclick.net tcp
GB 216.58.201.98:443 googleads.g.doubleclick.net tcp
GB 142.250.178.14:443 tcp
US 45.60.1.206:80 tcp

Files

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-journal

MD5 074634407fcb24e602d4741f52b7c7fd
SHA1 efd3b21d6a5f45ea80081ee82c68007c8de4fb9a
SHA256 2fa5a7da0f5e56cb7e0398601f02fd7fb1996fee2faf34b5b02c13a929982941
SHA512 878ea19b42e888f278ccc5fc5d795d4ce2150ded9dd56dec5b5097bee0c9445b97bd2c2aba89e943ac6b07b2c97ad706b6174fce09c2b01068cff874f1dc396c

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb

MD5 0eb157e1a86d4d00aa601dd2f6ff3ee3
SHA1 fee434f784e73cc7916322e949f727caf8363102
SHA256 b9a8194b71a046e8c0eb30995827b582b4bea834f630a5df2483b778a7d7d8a4
SHA512 b9b79b8c3af8a3f140df230fd89e95206358ba50ff214e7323a2dbbe2937b795f970e588302ffd5d721318bd597ce0a27af26d6cdb07f45569c30209845082a8

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-wal

MD5 90de7b95e100ebd40936f7831b56359c
SHA1 a8a723123888434393d576c07a405ebbe6e613b3
SHA256 42cf425d1f8d2f76237c4a3d5dd59c6c6896112630e1b0af6aed62a50f21966e
SHA512 3e265d5b6087a69c5fb48aa9678a2e56058e628024184409bfeef6c328d7b04ebe63a8761046849b7b30e6b087d8c41f8d888b9fbb336f05b8bbd0bf2258d87c

/system_ext/framework/androidx.window.extensions.jar

MD5 3056e1bdb7d4e19789d0319eff484bd0
SHA1 6791ae47aa9466fe0bca27ad6643f846853bbee4
SHA256 8e6331a07c9f2ac139214c527dcaff2c82d126bbe7bd3420cdc36d6a8c9204b0
SHA512 c790980fd68d9f89e32743bc28846807d5e5947c555f494de47714dec5cbd0c08d81c3260fa463759d1b17a953af3c44ec30b14fb08bf6b29db3837346c9f658

/system_ext/framework/androidx.window.sidecar.jar

MD5 29469324e59dfcc052f24b5af4e7b2c4
SHA1 10c1e17ac6f598037bb51baa07945663645de4eb
SHA256 9195dc6a1c75a841384050240dfc972e48178964993fba6619788625f4b40d1a
SHA512 5e27c2b1431369a248298f2f749136a575005584f9999f2a4c204a0c47adce2e33c8df9f058bdafa1bde1c99e46d175560cedfcddcd8581718ed1d9973c37cc2

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-wal

MD5 7720955c68af62b3839a7c796632c65e
SHA1 649a7b5a8af4cb3928c4709a4147d0d3a746d9a2
SHA256 0c038f0cf335b2d282f9e76b0af4d66022b0771c8ef4be814180e391a22052fd
SHA512 b228fe15faa2b2b443555db4b75b3a11748c34d7442721a1b90deeb32d1203005cbf43b7c549ff48de1288fec2117a40bf8372abfb98ff22b0f8be739c2d0375

/data/data/com.superlimpiador.acelerador/databases/google_app_measurement_local.db-journal

MD5 d4984b7413e027e1985323402b7a7624
SHA1 501b132b0f5aa6055e78856e0f48fea096efa3a9
SHA256 350ad796e2c975ddde38bdb39c80945cc26f12588004376af97374dfeca95c7b
SHA512 b6a5d2c6aedcc2f07eba406f30a07e0332daf8f2be8145c263879890786a91f0f98e11267a857af9d04b7616f6cbd5b2a9ccd76f6b7417976df61d4ef93caba3

/data/data/com.superlimpiador.acelerador/databases/google_app_measurement_local.db

MD5 da4c81d9a032121236a4ed034c0cc9d9
SHA1 6ea1d3d14a34c4dbe056fc4380747d3970cb3498
SHA256 30b7dde5771b5ef3cb6cd033fa2b1618a0674f41f47c1441855f3da24887a0ff
SHA512 e61d8e6af3d48cc6e95e34568209bc24308db9d751dd1451538907df0e7caa67e329c4615911b0c6614275f3e5cfb2a8a38288f5818487c5d292c18dd857849f

/data/data/com.superlimpiador.acelerador/databases/google_app_measurement_local.db-journal

MD5 3283ed800a20f0aad7e5b1cc76209bee
SHA1 b9242b7ca8d3294ddb72175d55c95418d8dcd32d
SHA256 07c1ab4f020c440fec52f2ccf843e5ac8e9a46266531f847f6d52f7b98987f8a
SHA512 6b516150b01338120e0e0b893e3d54b94f9e75c370d84cb88d7850c83f6fd7dadff6a0256f55a48f02c92a73ae4c9a47f91b83beb3a0a562dd6a55e38f90938f

/data/data/com.superlimpiador.acelerador/databases/google_app_measurement_local.db-journal

MD5 92a26b93b73164d699a4b280d7587b9a
SHA1 3af54e924beb4b32c7194fef78ff7ffa903bd84d
SHA256 188e5133542053ce9346626ea08e09418996dc0564338569c07de7719b917041
SHA512 f143cc764134da3fbf5e487a1c883eb596e3d6abb159c01b934853ba537e4b3c681e49b04ac1d84e94944652f750badc7b04eef062b519c2518c4a3308fee11a

/data/data/com.superlimpiador.acelerador/databases/google_app_measurement_local.db-journal

MD5 37975aa3c7cfdd03431f771bb00a764c
SHA1 1d2dcf782a077f9ef227be6886067e4ca103e03e
SHA256 27be67d26c70ee983a28eb5f652873c7d04d2123aae7060903d465f847dd798b
SHA512 89219612c5bf0553a92d385d699a219b8611138f1f0724c926d25406f186b1a278f0910bbfbde51d139c1011e7086eddb48aeb3598a50bd9f6bdd792199c3fbc

/data/data/com.superlimpiador.acelerador/databases/google_app_measurement_local.db-journal

MD5 53ba99056113a0b92375ddb52772beab
SHA1 045d7e15278ceb8c8fa7b0f03c512c40fb4849a7
SHA256 55911b23934517224064db7090017ae5a6d960979b0492b469c9f77113147243
SHA512 28c70f8d64a0db86af3aeff3313aaca976512627c088ed825035a97ca2104e6e30efd37adc5d53c1386db80222f6d36f3fcb57103201e92dec2e6f38d5a08c51

/data/data/com.superlimpiador.acelerador/cache/1664557424545.jar

MD5 dfb68e70e8eb84d844c9ce623ee069c1
SHA1 369e761858a904fe9fb89efcfc9bd3e6e56ee44f
SHA256 8ba015cb192f34326e6a46f765c6712d87c3797661541275c84b9a30ee449eec
SHA512 0d5f8ff91d3cd5c976cadf774b8d5cd6f276793b9eb9f3d8e7168eae122b0bfcffd833be9762de441d4b52f7bb3eb3850479aea37ac327be9b71910c6fdc566a

/data/user/0/com.superlimpiador.acelerador/cache/1664557424545.jar

MD5 722310b17c81cc3d780d23e1a63eb450
SHA1 0a0c1a939f923570e5da88aa5c7b105052f056e3
SHA256 9f2d7ff525ca785553557c351812252c0beface31440517e2f19929fe76472b1
SHA512 1a48e9383a0befb0c6b4755a8b56f352fba317910308f701e13ce8189c465cade6b0af510165d586745f1913a61cc68f91395949202394336a59c34596691a91

/data/data/com.superlimpiador.acelerador/cache/oat/x86_64/1664557424545.vdex

MD5 480d07e0214aeb0d51a0d29f6f0a6a22
SHA1 bb1a0580bf436ffe93d91756a9e2e646e449be9f
SHA256 e9e16898bfb89b40c3e9972f977730473d9b45ed0fdc5cbf868ff0e71f064290
SHA512 31c58c4bbeb49cc1ca7c705b829c55b50d980e9248277f9c96f1602fb1e6be8e7e3d3add5d3b002d28015822dc277e21905eec9dcc5685567c36e5ab97444171

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-11 15:20

Reported

2024-06-11 15:24

Platform

android-x86-arm-20240611-en

Max time kernel

168s

Max time network

137s

Command Line

com.superlimpiador.acelerador

Signatures

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /system/app/Superuser.apk N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.superlimpiador.acelerador/cache/1616432909849.jar N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.superlimpiador.acelerador

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.202:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 googleads.g.doubleclick.net udp
GB 142.250.179.226:443 googleads.g.doubleclick.net tcp
GB 142.250.179.226:443 googleads.g.doubleclick.net tcp
GB 142.250.179.226:443 googleads.g.doubleclick.net tcp
GB 142.250.179.226:443 googleads.g.doubleclick.net tcp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp

Files

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-journal

MD5 02ead409aaf566e691403d74bdef1139
SHA1 5a0d521b29a5c6c120271b1ac298cfac159e0f72
SHA256 f037af3232b0c2f7a394672fd66f5c82c0f2a6a21f6dd09ddd85cb369edc2960
SHA512 7a45539bfb6ec3bf0a897ea3685031ffc87b9f467a502712ce2965fa4dac4bf54c280d1506a2bffc3365d0c5fabda43d583728229840d63477c32807556f94dc

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-wal

MD5 cf1a98afc19033246b47ec22d19f9413
SHA1 068a1b02dfa288f38d11da9e3d23ceb01f0ce8c8
SHA256 8752e98dd15aa08fe22dcae43a4673f4b867f761dd771cb35fd6512d32add935
SHA512 6a171465580acba5913fa35447a1557bad1e420fd50e714b7e4a0bf452487d987fa1e40841c482363e077dc64f9971b51eb7c310fd8fdbc9856646360483a189

/data/data/com.superlimpiador.acelerador/no_backup/androidx.work.workdb-wal

MD5 c19b8e17a2fec3344a340be8891399dc
SHA1 9eb1409b840ccb6218967679d19cd6d5b60fde94
SHA256 c3d933db20efd87a511ba2beb22f3c60dabf42acf840ae9c5105969b8310bbfc
SHA512 09722db96cb4e0d0871dbdb39b32d7ce5aa8633073fee5956e014876df24f84de58248d6cd3d3268b791d24954d0e3415e833efef5363acca4c62afbee209eed

/data/data/com.superlimpiador.acelerador/cache/1616432909849.jar

MD5 2c84bc0c28d4ac333d267f7a152b4039
SHA1 49e67f04004587ae351d5aba4da5f18644746864
SHA256 1eea5584eb2332554753b4beec7fe8e972bfb3eeadbe0c05dba33de267f25a00
SHA512 44ab6c390cac8b11bf43097293ef73bb620b1466fd671a945639198ea10dea425a0c9443b47752cc0a6689a6f5a7661b35f7a8a350ffcba30a72be60d5f18abd

/data/user/0/com.superlimpiador.acelerador/cache/1616432909849.jar

MD5 86ce3683020b3f28f4110aac9c769ff7
SHA1 876e0686440524927639a4797b2f13b12a26ce4a
SHA256 be852340e03b169a28811d1ff41582d19638d9fc0540f237ecb960c45bd07071
SHA512 04d03a9963ba49adf5d0d26a21b57e85e21416fcc3d479ce7522149d45f5ab630ff78e590e724695fe29850b08b4dccfa5051daf5d4e4afd9384f7183f887ddc

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 15:20

Reported

2024-06-11 15:21

Platform

android-x64-20240611-en

Max time network

21s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.234:443 tcp
GB 172.217.169.78:443 tcp
GB 142.250.187.194:443 tcp
GB 142.250.179.234:443 tcp
GB 142.250.187.206:443 tcp
GB 142.250.180.10:443 tcp
BE 74.125.71.188:5228 tcp
GB 172.217.16.234:443 tcp
GB 172.217.16.234:443 tcp
GB 172.217.16.234:443 tcp
GB 172.217.16.234:443 tcp
GB 216.58.212.234:443 tcp
GB 216.58.212.234:443 tcp
GB 172.217.169.10:443 tcp
GB 142.250.187.195:443 tcp
GB 142.250.187.195:443 tcp
GB 172.217.169.68:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 172.217.169.68:443 www.google.com tcp

Files

N/A