Malware Analysis Report

2024-07-28 11:22

Sample ID 240614-awlv7sxfph
Target 3ce3c11a0013f24a1a828d2dba7c40b08d05f118de18b5a45863f64d10230393.bin
SHA256 3ce3c11a0013f24a1a828d2dba7c40b08d05f118de18b5a45863f64d10230393
Tags
discovery evasion persistence collection credential_access impact
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

3ce3c11a0013f24a1a828d2dba7c40b08d05f118de18b5a45863f64d10230393

Threat Level: Shows suspicious behavior

The file 3ce3c11a0013f24a1a828d2dba7c40b08d05f118de18b5a45863f64d10230393.bin was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery evasion persistence collection credential_access impact

Loads dropped Dex/Jar

Makes use of the framework's Accessibility service

Obtains sensitive information copied to the device clipboard

Declares services with permission to bind to the system

Requests dangerous framework permissions

Queries the mobile country code (MCC)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 00:33

Signatures

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 00:33

Reported

2024-06-14 00:36

Platform

android-x86-arm-20240611.1-en

Max time kernel

24s

Max time network

131s

Command Line

com.perl.gqm

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A Anonymous-DexFile@0xf36fe000-0xf36fe12c N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.perl.gqm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 site.ok-success.com udp
US 1.1.1.1:53 down.sinhan-bank.com udp
US 172.67.134.184:443 down.sinhan-bank.com tcp
US 1.1.1.1:53 ctef503oop.freemall-kr.top udp
US 172.67.196.50:443 ctef503oop.freemall-kr.top tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 216.58.212.202:443 tcp

Files

/data/data/com.perl.gqm/app_outdex/libdexprotector.4268.so

MD5 bf2c17d31f7d5442d6eeb42c5cef70ca
SHA1 2d604420aeba294bd44ad9d55076fa44959f120c
SHA256 b7351759655f61067adc9d73af8ba83b7adee0d730eb617597747e926020201e
SHA512 9eb00f26d770d8407790eff9f29665b2ed0b9bb77e1de3354a7f1ec30482b92f30ae94046edc194fe625b7c99ecca066fc0cec4833753cdce8638de419906403

Anonymous-DexFile@0xf36fe000-0xf36fe12c

MD5 7c80da100acf95df2c9629e515898a6b
SHA1 28c7d9a00126bc12a0760f9cc6270abea6866d73
SHA256 ed26ed598d0393b52cb68fd71e26f7eb5fba998f72c1c30eae4622bb0752692f
SHA512 b2eb8340ae3dd3ddbe2a5cf3de6b735a33bb15b51b728f01643fed02375c8962f37fcbd4827fd578cb73678847cc47c45290d763281be5caeded67fa8923c6a2

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 00:33

Reported

2024-06-14 00:37

Platform

android-x64-20240611.1-en

Max time kernel

47s

Max time network

131s

Command Line

com.perl.gqm

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.perl.gqm/[email protected] N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.perl.gqm

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 site.ok-success.com udp
GB 216.58.213.8:443 ssl.google-analytics.com tcp
GB 172.217.169.10:443 tcp
US 1.1.1.1:53 down.sinhan-bank.com udp
US 172.67.134.184:443 down.sinhan-bank.com tcp
US 1.1.1.1:53 ctef503oop.freemall-kr.top udp
US 172.67.196.50:443 ctef503oop.freemall-kr.top tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 172.217.169.78:443 tcp
GB 142.250.179.226:443 tcp
GB 172.217.169.42:443 tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp
GB 172.217.169.10:443 tcp
GB 172.217.169.14:443 tcp

Files

/data/data/com.perl.gqm/app_outdex/libdexprotector.5038.so

MD5 812119459a3e2875e25e865b114a4ed4
SHA1 52d9e1aac06ae84dfc0602ed4a15ef44bac94f03
SHA256 90b1e73045d51b8c0618ce86d89ee9ba5bc474c0ee9ea81b5139f9ff78d7cf93
SHA512 2d3e4f42144718ab30e215e129b7b05697fb59a5ec07886bed40ac7aef8e0c409055ac2555efa875a024fd454448d29c11d4f34e39d1c195dc50d0aa70d5c965

/data/user/0/com.perl.gqm/[email protected]

MD5 7c80da100acf95df2c9629e515898a6b
SHA1 28c7d9a00126bc12a0760f9cc6270abea6866d73
SHA256 ed26ed598d0393b52cb68fd71e26f7eb5fba998f72c1c30eae4622bb0752692f
SHA512 b2eb8340ae3dd3ddbe2a5cf3de6b735a33bb15b51b728f01643fed02375c8962f37fcbd4827fd578cb73678847cc47c45290d763281be5caeded67fa8923c6a2

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 00:33

Reported

2024-06-14 00:37

Platform

android-x64-arm64-20240611.1-en

Max time kernel

80s

Max time network

132s

Command Line

com.perl.gqm

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /system_ext/framework/androidx.window.sidecar.jar N/A N/A
N/A /system_ext/framework/androidx.window.sidecar.jar N/A N/A
N/A /data/user/0/com.perl.gqm/[email protected] N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.perl.gqm

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp
GB 172.217.16.234:443 tcp
GB 172.217.16.234:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 site.ok-success.com udp
US 1.1.1.1:53 down.sinhan-bank.com udp
US 104.21.6.104:443 down.sinhan-bank.com tcp
US 1.1.1.1:53 ctef503oop.freemall-kr.top udp
US 104.21.49.242:443 ctef503oop.freemall-kr.top tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/system_ext/framework/androidx.window.sidecar.jar

MD5 bdf3529e80318eb14e53a5bf3720c10d
SHA1 25c9ace4b1af6e80ebb2572345972c56505969ba
SHA256 bbc8300dd1e9cd08de8f66560c1ac2c928615b72b51cef9649f88974f586d64b
SHA512 48b9c2d01171bb651b9b54826baa51f4add48431a3efd8ceb5f7cc3bcd6f8f37edf47fabb24349dd15b3a02329cd450f90a8d164bf4f8dfae554bf3b35a8a55b

/data/user/0/com.perl.gqm/app_outdex/libdexprotector.4429.so

MD5 812119459a3e2875e25e865b114a4ed4
SHA1 52d9e1aac06ae84dfc0602ed4a15ef44bac94f03
SHA256 90b1e73045d51b8c0618ce86d89ee9ba5bc474c0ee9ea81b5139f9ff78d7cf93
SHA512 2d3e4f42144718ab30e215e129b7b05697fb59a5ec07886bed40ac7aef8e0c409055ac2555efa875a024fd454448d29c11d4f34e39d1c195dc50d0aa70d5c965

/data/user/0/com.perl.gqm/[email protected]

MD5 7c80da100acf95df2c9629e515898a6b
SHA1 28c7d9a00126bc12a0760f9cc6270abea6866d73
SHA256 ed26ed598d0393b52cb68fd71e26f7eb5fba998f72c1c30eae4622bb0752692f
SHA512 b2eb8340ae3dd3ddbe2a5cf3de6b735a33bb15b51b728f01643fed02375c8962f37fcbd4827fd578cb73678847cc47c45290d763281be5caeded67fa8923c6a2