Malware Analysis Report

2024-09-09 16:19

Sample ID 240612-rmcdvaxhnh
Target 07c1c3bb5b637a8b90dc011c58d618f141de07fecefcb770ac28876e8c53bfc6.bin
SHA256 07c1c3bb5b637a8b90dc011c58d618f141de07fecefcb770ac28876e8c53bfc6
Tags
discovery persistence collection credential_access impact
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

07c1c3bb5b637a8b90dc011c58d618f141de07fecefcb770ac28876e8c53bfc6

Threat Level: Shows suspicious behavior

The file 07c1c3bb5b637a8b90dc011c58d618f141de07fecefcb770ac28876e8c53bfc6.bin was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery persistence collection credential_access impact

Obtains sensitive information copied to the device clipboard

Queries information about active data network

Queries the mobile country code (MCC)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-12 14:18

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 14:18

Reported

2024-06-12 14:21

Platform

android-x86-arm-20240611.1-en

Max time kernel

34s

Max time network

131s

Command Line

com.yasharweb.homevisit

Signatures

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.yasharweb.homevisit

Network

Country Destination Domain Proto
GB 172.217.169.74:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 app.home-visit.ir udp
AM 185.208.173.3:443 app.home-visit.ir tcp
US 1.1.1.1:53 region1.google-analytics.com udp
US 216.239.32.36:443 region1.google-analytics.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp

Files

/data/misc/profiles/cur/0/com.yasharweb.homevisit/primary.prof

MD5 f9030b1d201b90a2a325b9480b2ed862
SHA1 0142cda8ef85e8fcab0551240bf291d632e42bac
SHA256 3bad73fa048f5a65742ea44988642f68bd1a1dc6f08757501e988fa445300d91
SHA512 a9cdffeb44b047528543527a0e68dffe2e62a40cecc1159fadc4e0b692d5d323d889f6dab31e13764d9ade230b082399fc642ce8f7e6652c9d870307f8eddb72

/data/data/com.yasharweb.homevisit/files/profileinstaller_profileWrittenFor_lastUpdateTime.dat

MD5 b08d976838b2ecdc6ac90d4c9cd558c0
SHA1 a19b2b79f7f0ffe60261d16ccf8e2c0565298106
SHA256 fb409b1a6e07c0f753b9c1268d7b3390eab60a1f24cbc9976edae281f44fb6aa
SHA512 dcb363ab197d6afedfbf5273abf6bb16b12561a5d19491bf50cdbd2525230621fec1047481a310474f54332926c430c3c0ed2b5e8197bc0677bc8fbff177b0c2

/data/data/com.yasharweb.homevisit/files/profileInstalled

MD5 ca902ff0b7ac566ad17b47a48fcfe55a
SHA1 86596b5dfb22063704e49c8edc57d93649832c67
SHA256 2c24b6165b86c3cd2194890219c64f58f58254ddbc75199e74786625aacf6d0c
SHA512 deb434cfa913ea8aa9e733f4ed010025a1e158f4baea24cdc36debe7a878dd0440f1494b088a0c04dcea530975c7d291d42ebb108f1fb59ddf4ccebf75549dbd

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-12 14:18

Reported

2024-06-12 14:21

Platform

android-x64-20240611.1-en

Max time network

159s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.169.10:443 tcp
GB 172.217.169.14:443 tcp
GB 216.58.201.106:443 tcp
BE 64.233.184.188:5228 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 mdh-pa.googleapis.com udp
GB 172.217.169.10:443 mdh-pa.googleapis.com tcp
US 1.1.1.1:53 safebrowsing.googleapis.com udp
GB 216.58.204.74:443 safebrowsing.googleapis.com tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp
GB 216.58.201.106:443 mdh-pa.googleapis.com tcp
GB 172.217.169.10:443 mdh-pa.googleapis.com tcp
GB 216.58.201.106:443 mdh-pa.googleapis.com tcp
GB 172.217.169.78:443 tcp
GB 142.250.179.226:443 tcp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-12 14:18

Reported

2024-06-12 14:21

Platform

android-x64-arm64-20240611.1-en

Max time kernel

50s

Max time network

138s

Command Line

com.yasharweb.homevisit

Signatures

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.yasharweb.homevisit

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 app.home-visit.ir udp
AM 185.208.173.3:443 app.home-visit.ir tcp
AM 185.208.173.3:443 app.home-visit.ir tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 region1.google-analytics.com udp
US 216.239.32.36:443 region1.google-analytics.com tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 216.58.212.227:443 tcp

Files

/data/misc/profiles/cur/0/com.yasharweb.homevisit/primary.prof

MD5 f9030b1d201b90a2a325b9480b2ed862
SHA1 0142cda8ef85e8fcab0551240bf291d632e42bac
SHA256 3bad73fa048f5a65742ea44988642f68bd1a1dc6f08757501e988fa445300d91
SHA512 a9cdffeb44b047528543527a0e68dffe2e62a40cecc1159fadc4e0b692d5d323d889f6dab31e13764d9ade230b082399fc642ce8f7e6652c9d870307f8eddb72

/data/data/com.yasharweb.homevisit/files/profileinstaller_profileWrittenFor_lastUpdateTime.dat

MD5 d6f7c900417395a19d92eebcf1d03ef6
SHA1 c008b9e944bfc8b87ff78c73298df6f631145733
SHA256 7d83d0819276c7d6e9ab225cf2cf2b91f88ae616ff62cb12803107cad3ea9c01
SHA512 45b4858ff162f5cdba01b212d98b7a79a50c99f6f003c19a0ac938d3c905bcb51e973e9324428a3823bb0e899e6cb43164479fbdf896aaf18f3da0a13c4a06ef