Malware Analysis Report

2024-07-28 11:35

Sample ID 240614-czq1fasbqh
Target a28c89841d88c0a759ac1b022af073e8.bin
SHA256 c8037e71f38e39b55c81d71b62aca6b330e2b763e54eb3c0b50dd90b71257b0a
Tags
banker collection discovery evasion persistence stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

c8037e71f38e39b55c81d71b62aca6b330e2b763e54eb3c0b50dd90b71257b0a

Threat Level: Likely malicious

The file a28c89841d88c0a759ac1b022af073e8.bin was found to be: Likely malicious.

Malicious Activity Summary

banker collection discovery evasion persistence stealth trojan

Removes its main activity from the application launcher

Queries information about running processes on the device

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries account information for other applications stored on the device

Loads dropped Dex/Jar

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Queries the unique device ID (IMEI, MEID, IMSI)

Reads information about phone network operator.

Queries information about the current Wi-Fi connection

Requests dangerous framework permissions

Queries information about active data network

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 02:31

Signatures

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 02:31

Reported

2024-06-14 02:34

Platform

android-x86-arm-20240611.1-en

Max time kernel

178s

Max time network

177s

Command Line

com.hyrc.gauv.erlb

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.hyrc.gauv.erlb

com.hyrc.gauv.erlb:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.140:80 ip.taobao.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.122.140:80 ip.taobao.com tcp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
CN 59.82.122.140:80 ip.taobao.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.172:80 ip.taobao.com tcp
GB 216.58.204.74:443 semanticlocation-pa.googleapis.com tcp
GB 216.58.204.74:443 semanticlocation-pa.googleapis.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.10:80 ip.taobao.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.122.10:80 ip.taobao.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 59.82.122.10:80 ip.taobao.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp

Files

/data/data/com.hyrc.gauv.erlb/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.hyrc.gauv.erlb/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/data/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 d15b414b75c79bf518288d04babe7494
SHA1 60949fa9e316ec9423415dc4a21a98e7813e3a62
SHA256 6dd0039f6e9898c06b5f7774aaf7401d0f49ca08c7b3eafa907359e432bd18ca
SHA512 bfae6e5876aec8cfb674f0d67d6e21054c1149f74a321a676f693e99bb98daa25a16028fcc3594b2b44d9eaca1a16b9cecd0e5938f546c6059148c5c4ad590fb

/data/data/com.hyrc.gauv.erlb/databases/lezzd

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.hyrc.gauv.erlb/databases/lezzd-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.hyrc.gauv.erlb/databases/lezzd-wal

MD5 eb6ee7a281706ecc34b6711332db2eb0
SHA1 bb0382c790ed123ef6cd729f8d02f5f2c802707a
SHA256 093b6e2ab10f8c3b3059b4868e553128bfa6b5160758fbe1bf963869db120d0f
SHA512 fb9ab49de06c5c50b33d319325471d82ea9527605030ca1d528e19b592e9f4cc50236c459bd18e685e2be37fb38bc92c878fae0ed771ca2cee3c892e7ff3cda3

/data/data/com.hyrc.gauv.erlb/app_mjf/oat/dz.jar.cur.prof

MD5 5e93ed868d629325cec45c2e3a9852ac
SHA1 1d996829dbef107daed2018a49d5c1f0ebef6b77
SHA256 3570f268f6b19eab88e7ca72096c4c628dfad6f2cbf414b2728ce5f9bf61dfc7
SHA512 70736033b5d0c5129ce8a0810abb307103f4859db510d21318f70c3d66bb41838a501a3f29bf3b121f9c0ce7edd5aeafc776970ddfe06e262d652f06922b825e

/data/data/com.hyrc.gauv.erlb/files/umeng_it.cache

MD5 560d24c696c3c961d5fc3a3eafb075f8
SHA1 d0b83395fef8fd0d01a914dfe2d338cff8e9a6ac
SHA256 040be4c75ec65b3610bbe851afc9c987d881621dbccafa42680993e47eee16bf
SHA512 e797ee069557fc158a2053c7f09f6964232d03142f0b410556fed7b5069cddb4c10ec0d587029a2aebe6ad8805bd7b9c4daa093f7d848b83b7ae85222a14cdcd

/data/data/com.hyrc.gauv.erlb/files/.umeng/exchangeIdentity.json

MD5 b17da8c2c5b6ec952b055435993e2097
SHA1 724843221d07845365e42a64dbb028f4e0568e3a
SHA256 d9fd3c3d72c6da0351adc000db3508431169f92d8bf2db97aebeee34ef9e230e
SHA512 3f47448741e7284db37bfc156a177ca3d8730ce531c4923ac49d077d177fa0971348db024e01de312eb0807adbb0f6d7d2ae267cd7f0018f829caaa6d4490a85

/data/data/com.hyrc.gauv.erlb/files/.um/um_cache_1718332389022.env

MD5 15c016dad62fe0afef9413b3e2d8ed1e
SHA1 180ae724dd7aa85a865dbff665d90fd50d88e323
SHA256 efc477bfcd4f5739030beef03999b472161a5e85d2b9c7b8af6f1fc27e92de67
SHA512 a036fec23aa68b12648d873dbda77a6ba8b4213d6ddb09db014d522415421821072df255b22a0dee5d09d5e9164127560b80da6420b3da9ff4332eb339673056

/data/data/com.hyrc.gauv.erlb/files/mobclick_agent_cached_com.hyrc.gauv.erlb1

MD5 bb992a15f1207c727bd29bd8597f70a2
SHA1 273633ee5a1efa6d19cfe5a41d2fba4ffb95c461
SHA256 c3ac03cf99a465ee0aa5c235222116ff85119a5ccf52d5d6f61ed63988cb1c8a
SHA512 45172572fe015cd2391b2da27b4eec019a7954f064af23b5f901178d8373eb4a0b8bd65548244a9d498304286076c1bc39f269fee75c7b7bf0ff48b0e3584521

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 02:31

Reported

2024-06-14 02:34

Platform

android-x64-20240611.1-en

Max time kernel

178s

Max time network

182s

Command Line

com.hyrc.gauv.erlb

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the unique device ID (IMEI, MEID, IMSI)

discovery

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.hyrc.gauv.erlb

com.hyrc.gauv.erlb:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.169.42:443 tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.172:80 ip.taobao.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.169.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.122.172:80 ip.taobao.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.180.14:443 android.apis.google.com tcp
GB 172.217.169.42:443 tcp
CN 59.82.122.172:80 ip.taobao.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
CN 59.82.122.172:80 ip.taobao.com tcp
GB 142.250.187.206:443 tcp
GB 142.250.187.194:443 tcp
GB 172.217.169.42:443 tcp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.141:80 alog.umeng.com tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.145:80 ip.taobao.com tcp
CN 59.82.122.145:80 ip.taobao.com tcp
CN 59.82.122.145:80 ip.taobao.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp

Files

/data/data/com.hyrc.gauv.erlb/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/data/com.hyrc.gauv.erlb/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/data/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 c58331a735266fadc6b4ac7f6a04f4db
SHA1 5c268ae6b15f3397806a4e14f15c776c19de025d
SHA256 fb6f5ef0e392a21d7cbfedc819eab8dba30d6a7c881146a5f3a05775a4bbb6e6
SHA512 dfe13260782fd7e0e7e87f7a7033d9fa43d11e0a2d277f5ac3fa14e8a58dd6a8a70e9417518ade2c28776eab01e6042d3170c9541e18768da71707c74c054f7e

/data/data/com.hyrc.gauv.erlb/databases/lezzd

MD5 dae68dcffc3d522a79f98ebbc3b6d457
SHA1 6df5dce9a50f12044a2d20b8d1742ae47b82ee03
SHA256 56cf91ca198812e0ef9ba4af0e96c08a32e24c917bcf2250bdebdfd7fd6f5286
SHA512 23b76f988399e9c9e4f5a7e8d19ecb765abdb115b0beee35f8ca9d221bbc5ee79f0152fac4261cc91eb9e7f874b5c6e9bff2dbb1812d31412d506cf83c16adcd

/data/data/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 22aed5392768267e8d2a10dabafe2092
SHA1 0fb220aa4792d4811af87a5c8e26b21bbd679ac5
SHA256 95c7a6fcab69b116092852adf5e5b9a82597eee0f8efdf95ebac46130766676c
SHA512 b21a7cae24ad86104480a54a670ebda8b243a2a0767a9015c578682145e390806d5a665782093e9bfda4ab6e3fbac4c61a1d06d35f4c5f4aa984d05836292597

/data/data/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 912042f34400a32475208b954ac87bd1
SHA1 e8a81b84a270c801d25c54d802e12b02e219b55e
SHA256 2dea1f1eb3c24cbf7d072f754f98f17551b94ddcdf0db418bc5324eaab16da22
SHA512 3031e1dae24acd6fdb4f1b13b4ae676c906d708f0ad79a8968c7297721537c64ab6673b7b0f6161bd5f26ebb2dae05fbb73d257ef4f0eb8cb6232362a8ab9796

/data/data/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 5b8519bff03ea0726fdf2cc16f8fb294
SHA1 0703a572c980f66703e6cbb29ada929b75a28495
SHA256 0704b30d8bb8f595d22afe3d6338e3f2f6f2bc3b60f990de75ff80696c7b67e9
SHA512 33540fed37f9a212851d4ae65ff4de2d68371affd0248eed6698b7e3ecf189d833cf6197c14892f9aaa97e4016d7312fb420d2a789ece17a5454ceac4e968427

/data/data/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 a1966dd9525b802c3682bb282f8f3c01
SHA1 3cf1c61a16c60001c120a0f9b75af3e6250ae13e
SHA256 ed2c4fbf2dffe45089da065694dbb4f4ffb55e41b89f01598872b239f877b35b
SHA512 51947932fae59a123da334c5d40aeaa571eb8b899ecbe8c3b283425c3fca8ad951d2cbabd338fb91749ce660bf788d698af3595aa0edde327e4a8ba2b8548acb

/data/data/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 3854eccbe5dbedb1ac88d5b4d864e79c
SHA1 01991d2bc82d7dd2f8256c3688f0173587e7b6a2
SHA256 58ae28a7fb62cd689557a49c43d18bfbdbc6914855b2cbb110222c0566cbe72d
SHA512 1d1d3e05a460b3479f953d27fc95a8e9475997b19447668c451cfaaf8971b1d3629100081c96c4de8fd2aa08bf06de1f53125f8ad5b4cba2f6afba78ad59d3af

/data/data/com.hyrc.gauv.erlb/files/umeng_it.cache

MD5 ccbaa5d6726f91182fc7248ca6413d73
SHA1 045d0f00d4eb9ed2fdc7d3bde87b3a37626952a6
SHA256 99f942d4e35722414011d09ed71dd9208c5c3da538674c0db7be6ae60abed28b
SHA512 69b4c3295b78ece52c6b60422e1b81a7c1a9791f7f1984efbbe9aa8247958ce95f494883a1ffb38494e6ad552da86ae2172d537b16d62fc810aeed335683923b

/data/data/com.hyrc.gauv.erlb/files/.umeng/exchangeIdentity.json

MD5 82f4d008705cdb6fb9a17c03635f727e
SHA1 005738962d7c4313526d966dadc53557bcc15578
SHA256 c6a06b386a7b901eebcf7f105bbb6b43222137604ba651237ff1c94791e7de9b
SHA512 7a7137a0c8b350b94364f6c001fec33661d577d9625e4d02e16b81252a103e75726a38f6b0ab12b6bf5a6dcff252ca38a80fe1304b33bd00c3078f26883d742c

/data/data/com.hyrc.gauv.erlb/files/.imprint

MD5 d1c9cc968b51db99f2de0b52e556c85c
SHA1 50339aa80a2050fb01c30bce10c3514db8c7d1fc
SHA256 8a3ece7f7369d5a0fd709748c55f5b38a4b5b245a863a772e2425652e1f804a5
SHA512 49d906623e3119456563c8a9bc2435daf78accacc09db1a4b694d10647d5bb1c4992eeb2aefe6d32524b2aa05210e78e1829b6a21a77b6ca50741f25122516b4

/data/data/com.hyrc.gauv.erlb/files/umeng_it.cache

MD5 8116ea3ab4736acc082879771e275cba
SHA1 2c90a341934cd3e7f865f7c53847b9b02c652122
SHA256 2ebf5868baf84211ce4df34bf54e59f424e02bad069be8d5b8de79f2e8fba248
SHA512 ac2089b86cad7c519622be8245e59f3db1d43537b04a6d33414f52396eeb9cc5519d4a659e1943278e212786c733e4c84c8e7acc329c84a0c574475bc0055b7f

/data/data/com.hyrc.gauv.erlb/files/.umeng/exchangeIdentity.json

MD5 8e624a2c9f96586e0f3f4ab5cd99ce57
SHA1 243c8a87adbd23f6d7537815c83751cf2fbd3851
SHA256 f0a6528c4e3881e67e8123eca0b65b21ee6a80377402bb7cd91ac06f2a7819b1
SHA512 d2ad21c45b02b1cfaaf206f0fc89f6a76d7a2ddb6b03e702e5eea8a972e52b1c7dcf3b742e54a731e436fe8557e8009fbff9fa01abff55e71b7c38c5bb7e5fcf

/data/data/com.hyrc.gauv.erlb/app_mjf/oat/dz.jar.cur.prof

MD5 6c59525ad1e58d45715a576c7399424d
SHA1 8a4df4c33c4cc5712243529f7447019fe73ed503
SHA256 1b4ef94717ee431f294225e9b909a3e07a692e8109743561d65e1e11ac431d9f
SHA512 b1cc76365d55a2f178402fe9f3f3cd689b9916c292d3696621aa48f350aa7b2b07420e735fa49aea7537774ddb7a9a6e48ce4f09540d04f81a6c5d99d634c347

/data/data/com.hyrc.gauv.erlb/files/.um/um_cache_1718332449828.env

MD5 0868e88403a5cf1ac1aae6c0419dc8c6
SHA1 b3017a38e6299ad15c77ee7215e743bc104129b8
SHA256 5f38ad3d7a38233bdb64a218d8e5630a408ea2e89552ef4ace184e8c1c22c5b6
SHA512 af68789e9972461b165b1e10409be9719271aea94e178e36385e530bd8471fa38b70856ddde9ec2376ebdd0e8d68655e3b27c5ce3e9a57c051ad05c60a4de364

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 02:31

Reported

2024-06-14 02:34

Platform

android-x64-arm64-20240611.1-en

Max time kernel

179s

Max time network

178s

Command Line

com.hyrc.gauv.erlb

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar N/A N/A
N/A /data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries account information for other applications stored on the device

collection
Description Indicator Process Target
Framework service call android.accounts.IAccountManager.getAccountsAsUser N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

Description Indicator Process Target
N/A alog.umeng.com N/A N/A
N/A alog.umeng.com N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Reads information about phone network operator.

discovery

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Processes

com.hyrc.gauv.erlb

com.hyrc.gauv.erlb:daemon

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 172.217.16.234:443 tcp
GB 172.217.16.234:443 tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.120.37:80 ip.taobao.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 c.ioate.com udp
CN 59.82.120.37:80 ip.taobao.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
CN 59.82.120.37:80 ip.taobao.com tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
CN 59.82.120.37:80 ip.taobao.com tcp
US 1.1.1.1:53 o.pmuro.com udp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 18.208.156.248:80 o.pmuro.com tcp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
US 1.1.1.1:53 ip.taobao.com udp
CN 59.82.122.165:80 ip.taobao.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 59.82.122.165:80 ip.taobao.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 59.82.122.165:80 ip.taobao.com tcp
CN 223.109.148.177:80 alog.umeng.com tcp
US 1.1.1.1:53 alog.umeng.co udp
US 1.1.1.1:53 alog.umeng.com udp
CN 223.109.148.177:80 alog.umeng.com tcp
CN 223.109.148.130:80 alog.umeng.com tcp
CN 223.109.148.178:80 alog.umeng.com tcp
CN 223.109.148.141:80 alog.umeng.com tcp
CN 223.109.148.179:80 alog.umeng.com tcp
CN 223.109.148.176:80 alog.umeng.com tcp

Files

/data/user/0/com.hyrc.gauv.erlb/app_mjf/tdz.jar

MD5 293ea5f01e27975bed5179ba79d80eac
SHA1 c5b0806a537fd1cb753e11f1a9684933317716b8
SHA256 8d86de68978e859c8262c0d0e932d3a1d57457b57ce88940620befab1bcead5b
SHA512 c7cd2881367fdf95ec4151449b359decdae1adf136388edbaaa9880c7ebd14fb3579e7a15600a856988c55d207f7ba1fd7d938f4d9168aba8a7ff1c3029d6b53

/data/user/0/com.hyrc.gauv.erlb/app_mjf/ddz.jar

MD5 23ba0b249042b7ba33e92c0199b0ea4a
SHA1 99b13ee9f7307316c2337953fceed87e9942b794
SHA256 1ed0751a141b17c80a921f5e8ba90c66a56b8e73156f5cbe133b57d550ca4ef2
SHA512 0cc88e2b7c2ffa4db274d690e3bf12098ec804b9fcd9e92b57d2fa0c4161031d2e84c91d86ba8e2b6e8b4837852defa099333f76bcd454c67b31632d0cdd4861

/data/user/0/com.hyrc.gauv.erlb/app_mjf/dz.jar

MD5 a54a18b58c6720991c021f433dfb2a46
SHA1 d2ffa07919f92b6e04914e39843f08fdb2a75b68
SHA256 3dd88e4418bd4271af728fc6436c873a55e6b6f5c8ed241ee2cb0ee24fe3f7f3
SHA512 e4a51b2462b247b1e5fbd947d06a2eba334f18398daadacbabcb4185f4255f05c22d656a8837a6088ffbdcaedfbdfbd8281c5dad4880c4e5021571e3fefc88cc

/data/user/0/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 0e687bd0645aec46ffbaddd59b7de681
SHA1 45a73617fddb5f76c5bd3ac1d86d83f41668cf48
SHA256 d57751b7f89a087e33d64acb13067de2b0738316b6b148f582f571c798fd338a
SHA512 a9513cb9b1a4326ee9f9b2b0bbbb542ae2d07d5c89d8b6c7251557b5168df6808e290bb2b5a852b6b6da98ee9bab70e59d1d367383ff5b319df223eba3457819

/data/user/0/com.hyrc.gauv.erlb/databases/lezzd

MD5 fdb8a92e5060ce104e8f0faca55a47ce
SHA1 270d7ca30673e18cec1d2b9add71cba96dc426fe
SHA256 194b40a3911f23ea75c8f4543a13c1236ae15b02c0228a080615a1012f60e05a
SHA512 ad962634ddd027403b5677a9ca979763071ef4a9b6f0127b0c1fd4b3a8bc51f5c4fa71245c301d0dbbf60e18953a94621715ce3ca4addef82b18030e3d718122

/data/user/0/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 c87cb4c7c23dfe37c4103fb6b2c82cc9
SHA1 10ca15f7fb259e3079272b3ac14e6348ea534543
SHA256 ad8e8aa4f377e7c77316b2b8e7e02f91f5bb18151346d789a71fbf1d7088679e
SHA512 0fa0892a589438f44cc81c2554593744fa8c9584f98011bbc5f9475780b437b7c46d5db5babc9deecee7cef975e0b8c261e68908568ae0b37cf129c847912082

/data/user/0/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 452104e02985114fcdd6626ae5952d55
SHA1 2dc10c836959e3cb57f3cf5ab3f708698e766d80
SHA256 e5d2b08388f04d8495d63426ae957a2d31a212ed6c5f5607508a69dc5145a365
SHA512 6198c074f45735b07271eeb6e1ec6d07e10e758ee0d73dd8e7cab0b37b0c6f1f017a261e089cb66406db6ca30f7e644e86a695cc75f16748f8147ce9b68f4ea7

/data/user/0/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 2a6820a9757cf2c17ec25102286f8b9a
SHA1 8f1ee606be3a5b7888e66462d79eaf3eb9f2b598
SHA256 266d8ef36468dbad11bd72030450ad08483de11844edb34788335bafad7be8a3
SHA512 41a06ab83cffdce9f388235aa239dcdc1f1cfdf6841a29c8a5b287f906299a242d5349c779673090533679b7604c8cda49d79890abd87d3ec230b5c8ce2d4d19

/data/user/0/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 e09857cf0fc580ac61c4be18a2c0cc36
SHA1 9d43b3eb4bfb16ee2175a2c68ee0076ba0ea842b
SHA256 ca4d75ca33a352968186f72ca9911bef3dc0ca2e606483edef68e97db3c4abbf
SHA512 94378634c261341b0cedd1fbce7878cfb46b50bc12984e976c36fe7c5cc1b21f7aba3ec86faafa6e132d6de889bbc64f676ea0951d84370192c228e993db94e7

/data/user/0/com.hyrc.gauv.erlb/databases/lezzd-journal

MD5 c1da2a4087ce93df77102588afe8993f
SHA1 94afc086c8faba764e566e58befd6ec08a4a7533
SHA256 74289974a95cadb6d6c27feebc8f8c60e9447baff1ec546251ea9999acc15134
SHA512 8fb3f5bd9e07bb45f60f38323ed9755e69972f328e7956464479086503edcbe50bf6d435af68d71cad055e23234dcad8389d68a534e729a4b07efe08b2a9590e

/data/user/0/com.hyrc.gauv.erlb/files/umeng_it.cache

MD5 ee53d4cda43859d0aa6ef13479418e43
SHA1 9923eb2d87aed1f91fa296c8be3c53ae04c75a31
SHA256 cfa2b285d5e35cce4a53ce3bed4f1c8d2ba4ed65a2bfd0e65be7ff0a0b1645b6
SHA512 4a3202d4378a4f5825a7b3da6cadabbe98b8cace8a1611ac756a73a7c2087d3ba87383613d313accb5ab2b6d0aaba2abe804b2b8891e6f0e981ffb284952e9f3

/data/user/0/com.hyrc.gauv.erlb/files/.umeng/exchangeIdentity.json

MD5 c03b95a54cfa2bba434f4a5c047971b2
SHA1 0e3d908fbf82f5ac529c423bff9d506345105a69
SHA256 a3b7194df6df69735d83cff51f210bd3b1517554381ecc16eff78413e5b72ccb
SHA512 1e3f02369fd209d595005cec9ad2fb26cddc3cd4c77a660da31f91b6fddad8d51617c611ca2398ff4ea6748b835404482d0d3509510f2dd11cba88e709bfc622

/data/user/0/com.hyrc.gauv.erlb/files/.um/um_cache_1718332388209.env

MD5 042d1651291f59ac402bb290d3f0a0e3
SHA1 6f4d0446a8d03290aa2193e657cb2f47d2122204
SHA256 2591b81c92c2228993b446d415e1bad14adb659fc5c7e4eea15bb445f6d1aabf
SHA512 88ae719c02537c83f46f25950d8889041b4a7ccbc875d067ea12851b0bf5cd93023bee2c95e2a0703911bfe2eea4361cfa74cf2c4a23f36adfc9d82548b12a9b

/data/user/0/com.hyrc.gauv.erlb/files/mobclick_agent_cached_com.hyrc.gauv.erlb1

MD5 fbf8d01ae9fc4efc845eb3f45e2d2c6f
SHA1 8dfbe782edd5dd93dcd392a4673830c5c54f5dd7
SHA256 58b66761e1a208f0653a7f05f2f450e21e240087fd9450ebd54568a1456134dc
SHA512 63eaa907382b2dc444332c088fcf6b308178220d44cec30949526570237ef04c4a8aa56cc364a657d1e3c86a1d6a7cd300b8a2f5c3b190f9e39deb50a875dd0a