Analysis
-
max time kernel
176s -
max time network
182s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
14-06-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
80f4b2a7dff768ce67ca462260e1157d267aacbd397f90421373458952e06aca.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
80f4b2a7dff768ce67ca462260e1157d267aacbd397f90421373458952e06aca.apk
Resource
android-x64-20240611.1-en
Behavioral task
behavioral3
Sample
80f4b2a7dff768ce67ca462260e1157d267aacbd397f90421373458952e06aca.apk
Resource
android-x64-arm64-20240611.1-en
General
-
Target
80f4b2a7dff768ce67ca462260e1157d267aacbd397f90421373458952e06aca.apk
-
Size
1.8MB
-
MD5
76a55dbd343ef178ae3484edc14c3c24
-
SHA1
eb8fbb10b2a83e5e5f56be1e7ea25e6386bf4307
-
SHA256
80f4b2a7dff768ce67ca462260e1157d267aacbd397f90421373458952e06aca
-
SHA512
74464e02c2c303146c386f95328970f8f1fbeb90c62a7001f9bee2c10727efaec805a1807aec8317f5481b2a4843228641620e3abeb2e0022c07138da0065dd8
-
SSDEEP
49152:vlsrgPetnJKQqmJkjxc6gSGCd9KlmpggshSzktnEs:vyrgezk2Cd8lm2VhPtnEs
Malware Config
Extracted
hook
http://91.92.251.201:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
gafagajags.agakavs.aagajav/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/oat/x86/LgFBxOP5.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.bin 4267 gafagajags.agakavs.aagajav /data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.bin 4331 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/oat/x86/LgFBxOP5.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.bin 4267 gafagajags.agakavs.aagajav -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId gafagajags.agakavs.aagajav Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId gafagajags.agakavs.aagajav Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText gafagajags.agakavs.aagajav -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses gafagajags.agakavs.aagajav -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock gafagajags.agakavs.aagajav -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground gafagajags.agakavs.aagajav -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
gafagajags.agakavs.aagajavioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction gafagajags.agakavs.aagajav android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction gafagajags.agakavs.aagajav android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction gafagajags.agakavs.aagajav android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction gafagajags.agakavs.aagajav -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo gafagajags.agakavs.aagajav -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone gafagajags.agakavs.aagajav -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
gafagajags.agakavs.aagajavdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS gafagajags.agakavs.aagajav -
Requests enabling of the accessibility settings. 1 IoCs
Processes:
gafagajags.agakavs.aagajavdescription ioc process Intent action android.settings.ACCESSIBILITY_SETTINGS gafagajags.agakavs.aagajav -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call android.app.IActivityManager.registerReceiver gafagajags.agakavs.aagajav -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework service call android.app.job.IJobScheduler.schedule gafagajags.agakavs.aagajav -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
gafagajags.agakavs.aagajavdescription ioc process Framework API call javax.crypto.Cipher.doFinal gafagajags.agakavs.aagajav
Processes
-
gafagajags.agakavs.aagajav1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Requests enabling of the accessibility settings.
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.bin --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/oat/x86/LgFBxOP5.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.binFilesize
1.5MB
MD58ee0a9df9185bb950ea8279c16f209a1
SHA13cf04ef77560667068fa85cfc6f65595f83a8de8
SHA256edf35361402a6a75a442942474c71f5868aa7eaa61f6cefe742792a0dc36ced5
SHA51214e1de04dec24dbf8aea4166b1fc5aaf6d6b0db2d9a518edf4920e4fc61f30256bca2c5a074fd9d606f0192d445398b5a4e4363d7f1fa0089edfa83efa370dee
-
/data/data/gafagajags.agakavs.aagajav/no_backup/androidx.work.workdbFilesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
/data/data/gafagajags.agakavs.aagajav/no_backup/androidx.work.workdb-journalFilesize
512B
MD51995cf4124de37daffcf99f6852cc94b
SHA130fa55cadc489cebbf93d1423898e4899960555c
SHA2563d5a2e2b922432a4fb74ff40a8f8573bbeca10160f704c24b9d711e4e8f9c83d
SHA51298a0bfae5b7a41037cab6b40ed4324e59c7cb1007cfaeda7a9a60b846f7795a077193ed4674887ce4e283e4e1a987b741de703c371317523231d2d8fdeda40cc
-
/data/data/gafagajags.agakavs.aagajav/no_backup/androidx.work.workdb-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/gafagajags.agakavs.aagajav/no_backup/androidx.work.workdb-walFilesize
173KB
MD5bba56a0b2f32f50307632d43c7fe0fc8
SHA1ca789a1f2f4d22827147e6ed0daa3be64c7c7dfd
SHA256ab142f418dc5c70598b4ff6b682a70be453621c93a1b95771856c12b6653d2b4
SHA5120a1c3daca5909dd663963e9bbc59ed402928382a672b6e696fcd12e80231db41b28c12da8e1ea24ccda175e469ab3d338500911d8c9dae7bce16736776ee4f09
-
/data/data/gafagajags.agakavs.aagajav/no_backup/androidx.work.workdb-walFilesize
16KB
MD54b537dab85fc9e707e33453c786d9221
SHA1c12e8d72bc28d9781d03ab342ba3866aaf0b5eb2
SHA2562c487f7df385db231a4505b01400a8aa6fa912596ca224e1de947d2c16825d85
SHA5121e1c6d0adaa75c9a435dee9879dba60262281eca95dd358d90ea2bb6d0306263b0514380641758fb5d7db53f3cdf3245ce4221b3e7f913191b6400ffda1ea800
-
/data/data/gafagajags.agakavs.aagajav/no_backup/androidx.work.workdb-walFilesize
108KB
MD5f388729c9bf60688f436cf8820ec56f4
SHA1d59b6968fc32a544c1827a7f21efad88047c1b4c
SHA2569c841e0c416379801b7fb3154e11386133c09d8ff6afdd1f31042cb8d61a4f30
SHA51254908a0460b7c373a309d1b963a937d932b5281bccf2e50a66dc1546aec00a3841f3082ab79bbfb5e3cffe6e5bfff4541c50c548ed453d49cc5b9035d2354494
-
/data/user/0/gafagajags.agakavs.aagajav/app_apkprotector_dex/LgFBxOP5.binFilesize
1.5MB
MD5d8e7dc9dba1d9bd3a010a8b986b43c0c
SHA1408fef0b84cd840aa8b0769ed8c450fc749f15b6
SHA256b42464c3103675fb7aa60654733fb77c0250aa183aadf5f341fb61e568eed099
SHA512d9162b6a135da96df3c3d29a5d0d353f65d20001ea4ac9ca10326b933e3a0abc5661e1075633fdb50b944daf3d5f3d1cc39f63c1c1d6efe46af66aa6d72389d6