Malware Analysis Report

2024-09-09 12:51

Sample ID 240614-apd7sa1dnn
Target 681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c.bin
SHA256 681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c
Tags
collection credential_access evasion impact discovery persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c

Threat Level: Shows suspicious behavior

The file 681746480927bb0ea963274be95e56ffc5f56aa447003394b40bd9f2f094599c.bin was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection credential_access evasion impact discovery persistence

Loads dropped Dex/Jar

Makes use of the framework's Accessibility service

Obtains sensitive information copied to the device clipboard

Declares services with permission to bind to the system

Requests dangerous framework permissions

Queries the mobile country code (MCC)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 00:22

Signatures

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 00:22

Reported

2024-06-14 00:26

Platform

android-x64-arm64-20240611.1-en

Max time kernel

47s

Max time network

132s

Command Line

com.perl.gqm

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /system_ext/framework/androidx.window.sidecar.jar N/A N/A
N/A /system_ext/framework/androidx.window.sidecar.jar N/A N/A
N/A /data/user/0/com.perl.gqm/[email protected] N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.perl.gqm

Network

Country Destination Domain Proto
GB 172.217.16.238:443 tcp
GB 172.217.16.238:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.201.106:443 tcp
GB 216.58.201.106:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 visakor.info udp
HK 8.217.194.83:443 visakor.info tcp
HK 8.217.194.83:443 visakor.info tcp
US 1.1.1.1:53 down.sinhan-bank.com udp
US 104.21.6.104:443 down.sinhan-bank.com tcp
US 1.1.1.1:53 ctef503oop.freemall-kr.top udp
US 1.1.1.1:53 tags.tiqcdn.com udp
US 104.21.49.242:443 ctef503oop.freemall-kr.top tcp
GB 108.138.217.49:443 tags.tiqcdn.com tcp
US 1.1.1.1:53 www.youtube.com udp
GB 172.217.169.68:443 tcp
GB 172.217.169.68:443 tcp

Files

/system_ext/framework/androidx.window.sidecar.jar

MD5 bdf3529e80318eb14e53a5bf3720c10d
SHA1 25c9ace4b1af6e80ebb2572345972c56505969ba
SHA256 bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b
SHA512 48b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b

/data/user/0/com.perl.gqm/app_outdex/libdexprotector.4436.so

MD5 93716cc80bb61aeab2afbbdec51ccbb1
SHA1 066efb5f0c4a68520561bdb5691a3e3fbe8e8e2d
SHA256 422bb97f93c6e69c43d0e47267dafc0a043ab3ae7cfbfd1930b56f6fe4353861
SHA512 54718505600be76cd334d93c221faa10ae1fc14a7acea5d8ee1e0c1b56e40ba642c01b977c7c9cbeb81b98818f040f60227dc22738841ea9df9dac922ff3198b

/data/user/0/com.perl.gqm/[email protected]

MD5 7c80da100acf95df2c9629e515898a6b
SHA1 28c7d9a00126bc12a0760f9cc6270abea6866d73
SHA256 ed26ed598d0393b52cb68fd71e26f7eb5fba998f72c1c30eae4622bb0752692f
SHA512 b2eb8340ae3dd3ddbe2a5cf3de6b735a33bb15b51b728f01643fed02375c8962f37fcbd4827fd578cb73678847cc47c45290d763281be5caeded67fa8923c6a2

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 00:22

Reported

2024-06-14 00:26

Platform

android-x86-arm-20240611.1-en

Max time kernel

47s

Max time network

160s

Command Line

com.perl.gqm

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A Anonymous-DexFile@0xee4a4000-0xee4a412c N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.perl.gqm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.74:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 visakor.info udp
US 1.1.1.1:53 down.sinhan-bank.com udp
US 104.21.6.104:443 down.sinhan-bank.com tcp
HK 8.217.194.83:443 visakor.info tcp
HK 8.217.194.83:443 visakor.info tcp
US 1.1.1.1:53 ctef503oop.freemall-kr.top udp
HK 8.217.194.83:443 visakor.info tcp
HK 8.217.194.83:443 visakor.info tcp
US 104.21.49.242:443 ctef503oop.freemall-kr.top tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 tags.tiqcdn.com udp
GB 108.138.217.42:443 tags.tiqcdn.com tcp
US 1.1.1.1:53 www.youtube.com udp
GB 172.217.169.78:443 www.youtube.com tcp
GB 216.58.212.202:443 tcp
GB 216.58.212.202:443 tcp

Files

/data/data/com.perl.gqm/app_outdex/libdexprotector.4323.so

MD5 a77ba346138d6026cbdda83ed6d10ee8
SHA1 cc2c6dbecf56939d2341520b0285cecdf4ccd470
SHA256 858a45600b5b633682d05d8dfe25479cab5d2b3cfe66e6ffde3f874d2fa8ca3e
SHA512 452aaace6bffda4c4099c037f2e1dabccb21cfe7138ee96482e4bafe55fc56504aa66028f0ccc30d980ffedeff1671207d11bbfc3bed32ed0e18ce8ffdf69a2c

Anonymous-DexFile@0xee4a4000-0xee4a412c

MD5 7c80da100acf95df2c9629e515898a6b
SHA1 28c7d9a00126bc12a0760f9cc6270abea6866d73
SHA256 ed26ed598d0393b52cb68fd71e26f7eb5fba998f72c1c30eae4622bb0752692f
SHA512 b2eb8340ae3dd3ddbe2a5cf3de6b735a33bb15b51b728f01643fed02375c8962f37fcbd4827fd578cb73678847cc47c45290d763281be5caeded67fa8923c6a2

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 00:22

Reported

2024-06-14 00:26

Platform

android-x64-20240611.1-en

Max time kernel

49s

Max time network

151s

Command Line

com.perl.gqm

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.perl.gqm/[email protected] N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.perl.gqm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.179.232:443 ssl.google-analytics.com tcp
GB 142.250.178.10:443 tcp
US 1.1.1.1:53 visakor.info udp
US 1.1.1.1:53 down.sinhan-bank.com udp
US 104.21.6.104:443 down.sinhan-bank.com tcp
HK 8.217.194.83:443 visakor.info tcp
HK 8.217.194.83:443 visakor.info tcp
US 1.1.1.1:53 ctef503oop.freemall-kr.top udp
US 104.21.49.242:443 ctef503oop.freemall-kr.top tcp
US 1.1.1.1:53 tags.tiqcdn.com udp
GB 108.138.217.129:443 tags.tiqcdn.com tcp
US 1.1.1.1:53 www.youtube.com udp
GB 142.250.180.14:443 www.youtube.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp
GB 142.250.178.14:443 www.youtube.com tcp
GB 216.58.201.98:443 tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 216.58.213.14:443 android.apis.google.com tcp

Files

/data/data/com.perl.gqm/app_outdex/libdexprotector.5032.so

MD5 93716cc80bb61aeab2afbbdec51ccbb1
SHA1 066efb5f0c4a68520561bdb5691a3e3fbe8e8e2d
SHA256 422bb97f93c6e69c43d0e47267dafc0a043ab3ae7cfbfd1930b56f6fe4353861
SHA512 54718505600be76cd334d93c221faa10ae1fc14a7acea5d8ee1e0c1b56e40ba642c01b977c7c9cbeb81b98818f040f60227dc22738841ea9df9dac922ff3198b

/data/user/0/com.perl.gqm/[email protected]

MD5 7c80da100acf95df2c9629e515898a6b
SHA1 28c7d9a00126bc12a0760f9cc6270abea6866d73
SHA256 ed26ed598d0393b52cb68fd71e26f7eb5fba998f72c1c30eae4622bb0752692f
SHA512 b2eb8340ae3dd3ddbe2a5cf3de6b735a33bb15b51b728f01643fed02375c8962f37fcbd4827fd578cb73678847cc47c45290d763281be5caeded67fa8923c6a2