Malware Analysis Report

2024-07-28 11:42

Sample ID 240619-175essthrc
Target 7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300.bin
SHA256 7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300
Tags
ermac hook banker collection credential_access discovery evasion execution impact infostealer persistence rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300

Threat Level: Known bad

The file 7c2cda3b77b484079af1befae1d9554b025af1ca159da99a62bbfbd5fb51b300.bin was found to be: Known bad.

Malicious Activity Summary

ermac hook banker collection credential_access discovery evasion execution impact infostealer persistence rat trojan

Hook

Ermac

Ermac2 payload

Loads dropped Dex/Jar

Queries information about running processes on the device

Makes use of the framework's Accessibility service

Queries the phone number (MSISDN for GSM devices)

Queries the mobile country code (MCC)

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

Requests enabling of the accessibility settings.

Queries information about the current Wi-Fi connection

Acquires the wake lock

Declares services with permission to bind to the system

Reads information about phone network operator.

Makes use of the framework's foreground persistence service

Performs UI accessibility actions on behalf of the user

Schedules tasks to execute at a specified time

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-19 22:18

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 22:18

Reported

2024-06-19 22:21

Platform

android-x86-arm-20240611.1-en

Max time kernel

179s

Max time network

131s

Command Line

com.ranixebovura.delasawa

Signatures

Ermac

banker trojan infostealer ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Hook

rat trojan infostealer hook

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex N/A N/A
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex N/A N/A
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.ranixebovura.delasawa

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.ranixebovura.delasawa/app_ded/oat/x86/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 null udp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp

Files

/data/data/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex

MD5 30e4337aa68709c8f6ce01b80152e81d
SHA1 0a5ca096e3b56b6bdb8c2a001389a20ac2fe74b2
SHA256 7019c6bfd4a49e1fd27aab97bcd586ffa244c3c68401cdd8b07925b6e68c7f52
SHA512 879d2cba8a8914439f5f4960e778472a721c5b2162fff98a480bb9af7b9f08a4914d766c84f20e789123d219975bcd1bc21c24a8d7bdfd9b7a18dda7bc86ab4a

/data/user/0/com.ranixebovura.delasawa/app_ded/ZiHrSbycxxHHsTXPcKPnaY3PW1Yb5Qat.dex

MD5 799add7144037575f35d6e6b8ae845e9
SHA1 a66dd3f36f8cbad318ceb4229522b55561e97ce7
SHA256 a3c755a919f71d960388992c704e27844bce6f6661068b265963a06ae156d688
SHA512 f70bd5cb515c6b286b0fcf7a3a11cda23027ce09601448755c0d51b7341c33197e15b645b99040b2b5ac3a91e405d6e0799081995856232520bd455ed66a898f

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-journal

MD5 998bd8adfcd69f09a5faedc513cb1bea
SHA1 54860f3e5c482b266d18f92f637626ece4d48a20
SHA256 a858d410cc689b8598041f0d60ec2215bcaff8383c59d5fbf8e2cb22a052c711
SHA512 22c15377346adf84698d016fc466b0ed86f1216db597fc2004a7a4354308f9269fcf2a26a65a1e84e5941abbfbd5ec7b8a3c0599206bfd64b6d8c2f9eaf01356

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 0eed69fda2f7357c78eb26ef7704e706
SHA1 8a67ad9932b2100e76630ab4615aaf4d31b2841d
SHA256 43e5b807522fa1dadf179a1489245b24b202c1e310461dbd24852cbb650e2e31
SHA512 44c1135e42ef712d5fa4d20584887851dae41df2ce815dc60581fa08822dec2d147e7a3212a8e6463c75fa0a6974340ddaec89b929db9deee116d1dbc0c249a6

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 042116caa10b784351e4485f7d4ccf3a
SHA1 02caa15d97579cb2dd5199fe22d047a0e7414168
SHA256 ac2ad1893d3212164165f48a7a4fc5ad6edaeb7234a5ba7ac59fb15319628b2b
SHA512 9e0311a52e14a1a2354cf37f67d174dae9e9d27d8abf74ef5444bfe1e6fa6386d9c751ca6a5fa9b77ff59244cba87849865a508a44b8ad7b088e59ef4e623966

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 f67f2d622cbad4da066196fae6e80c6b
SHA1 59029ced079245026a527603687c5fc3c3d1a4fb
SHA256 4dc01c7af90c86eb7938f290e3212711446682fcbaa485a3ec65d7fda4764241
SHA512 34660fa745f44b8f31643b5760f574b377d5a3a56bbce3b195b1220dd92f59b142e67643522735111fd49cf60c021771f68917470eb0554c2cd52bbd258b1c40

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 22:18

Reported

2024-06-19 22:21

Platform

android-x64-20240611.1-en

Max time kernel

28s

Max time network

183s

Command Line

com.ranixebovura.delasawa

Signatures

Ermac

banker trojan infostealer ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A

Hook

rat trojan infostealer hook

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/2cFoytwg3yBiBP785ToYKqrXLXJvHKxt.dex N/A N/A
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/2cFoytwg3yBiBP785ToYKqrXLXJvHKxt.dex N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.ranixebovura.delasawa

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
GB 172.217.16.234:443 tcp
US 1.1.1.1:53 null udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.212.202:443 semanticlocation-pa.googleapis.com tcp
GB 172.217.16.234:443 semanticlocation-pa.googleapis.com tcp
GB 194.238.17.70:3434 tcp
GB 142.250.178.14:443 tcp
GB 142.250.187.226:443 tcp
GB 172.217.16.234:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp
GB 216.58.204.78:443 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp

Files

/data/data/com.ranixebovura.delasawa/app_ded/2cFoytwg3yBiBP785ToYKqrXLXJvHKxt.dex

MD5 30e4337aa68709c8f6ce01b80152e81d
SHA1 0a5ca096e3b56b6bdb8c2a001389a20ac2fe74b2
SHA256 7019c6bfd4a49e1fd27aab97bcd586ffa244c3c68401cdd8b07925b6e68c7f52
SHA512 879d2cba8a8914439f5f4960e778472a721c5b2162fff98a480bb9af7b9f08a4914d766c84f20e789123d219975bcd1bc21c24a8d7bdfd9b7a18dda7bc86ab4a

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-journal

MD5 bfd27192127fe60c1dfebffabea0a11f
SHA1 67c640b89acc26da48cb38d675fdedf6680b99db
SHA256 a9119cda5c486f5b7b162ccf71c61fd051ba21e453dd9f725eb44db87f2bd9f3
SHA512 cb961f8b9afda418ee880af545f3ddda506ad9d173dd6383b5f334b427924b5e85241bb6323f45806088ec3adcbf79cb47aeb1dc79a483f88b0cdfbc46e50d6c

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 b2097827a761a3cfd4878ae4ebbb6392
SHA1 38c76615ddee1cbf7a1763594f2531570523620e
SHA256 e0e0f959283c21002aa327991903bb8618011c0b3899ca68ba65bc6a83509724
SHA512 8f932f38cdbfe0befbcb8d9809199cdb7c7bf1879dbf601269eace5ea881cd551971a20ebad0095fbbe1e93698da61625689177ca2422ab926b4540e938b7bd7

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 c1f03ad206e8bf3fd7b19a87b0ea29a1
SHA1 432f11d971ec136e3d168c0afd4f9325d9278c83
SHA256 96662437e9294d2c5a3f6dcad4cced68f8730cdf509ef80520178301baba3edb
SHA512 07773c9702b07dc83a80d6782162ec60bb77372da55a26722961a87eba4eb07a7d318ac4817735557e44672136c8a39670099cb1419ee0385d9d0fee4658b62f

/data/data/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 f67052ebfb1adb37a81c0b605d4f56e1
SHA1 bf7182cfbebd26b6464abbb18ba2b990b4da6818
SHA256 ed1d6f21043d49e1fb30a1e6d26246b81f74cefff0a2414f9081ddc910e596a8
SHA512 fdb170086c47a393b8d5c6d77fad46189650a33f79903cefd7f7ff5b73eb9f7c096878d7112730ccf7cb7cbd00189d32589c0071182cc4ad9ea0f4a3a98c495f

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-19 22:18

Reported

2024-06-19 22:21

Platform

android-x64-arm64-20240611.1-en

Max time kernel

121s

Max time network

163s

Command Line

com.ranixebovura.delasawa

Signatures

Ermac

banker trojan infostealer ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A

Hook

rat trojan infostealer hook

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/qv9guHYqZtRRUcTJKH9vmwSHdrfLexKR.dex N/A N/A
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/qv9guHYqZtRRUcTJKH9vmwSHdrfLexKR.dex N/A N/A
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/qv9guHYqZtRRUcTJKH9vmwSHdrfLexKR.dex (deleted) N/A N/A
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/qv9guHYqZtRRUcTJKH9vmwSHdrfLexKR.dex (deleted) N/A N/A
N/A /data/user/0/com.ranixebovura.delasawa/app_ded/qv9guHYqZtRRUcTJKH9vmwSHdrfLexKR.dex (deleted) N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.ranixebovura.delasawa

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.78:443 tcp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 null udp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp
GB 194.238.17.70:3434 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.200.36:443 www.google.com tcp

Files

/data/user/0/com.ranixebovura.delasawa/app_ded/qv9guHYqZtRRUcTJKH9vmwSHdrfLexKR.dex

MD5 30e4337aa68709c8f6ce01b80152e81d
SHA1 0a5ca096e3b56b6bdb8c2a001389a20ac2fe74b2
SHA256 7019c6bfd4a49e1fd27aab97bcd586ffa244c3c68401cdd8b07925b6e68c7f52
SHA512 879d2cba8a8914439f5f4960e778472a721c5b2162fff98a480bb9af7b9f08a4914d766c84f20e789123d219975bcd1bc21c24a8d7bdfd9b7a18dda7bc86ab4a

/data/user/0/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-journal

MD5 7482331ea86f041a0ce080f933569011
SHA1 02622fca412cb57a1c231543daee44815a336803
SHA256 d3e8895204dbe4add1d8ea3a0ad932c6775e7549de491f61a460a067e99829cb
SHA512 34fe2a4e4a8c673a68308edb95e4e12e45fa979385a2172d5d528965d9097b197bbe79132952efb099618366435811637c7a387081d865da38e31169047925b1

/data/user/0/com.ranixebovura.delasawa/no_backup/androidx.work.workdb

MD5 7e858c4054eb00fcddc653a04e5cd1c6
SHA1 2e056bf31a8d78df136f02a62afeeca77f4faccf
SHA256 9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512 d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

/data/user/0/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/user/0/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 9033070784d147b241e917aefe44f50d
SHA1 11999aa5456a1ec9cec7f3b068108e1c5c700cc9
SHA256 3606310b458a6d1f6189a7b04982102a6bb5bd61d4e5794636061b1982ddbb36
SHA512 045c6fcc884b3ecbb4eb2e17c1148b0482ae1b5dd2b90ad7fcb021693b1a75321d60f87581cf447b73f2bf09eb623230f1efbf7b6f8e3341b1d83365869e1da0

/data/user/0/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 b4d1b7e5359f54656de39f4df0b5dbda
SHA1 b0cc877549335be9280e2d000836a9d4298cf80d
SHA256 ba377ffa13253f6b0c0d020ac47662703926580f578c6d082f7bb067fc7b7109
SHA512 e684dd50315c91cec9b91b8b24da54f6d36020f0e53176d071098222940d572fc9e1e9a8e02dbd2abc73ea998b6ee95790cdb7496b7d6b223116587646f6a5a4

/data/user/0/com.ranixebovura.delasawa/no_backup/androidx.work.workdb-wal

MD5 a549c53fa12b04e86c3da0d6485af96e
SHA1 598b38bb0967f38353608c498b951139d728ddfe
SHA256 c114f668a89010094cd91f43b754119d3e3a78c09fa6e450a196c5c343c21fb8
SHA512 2ad4f2231b22770c1244b5f79932d67fb0d2202c7157c9cc505bf832d2a84bb40df0faf2a6ae41bfba8960adcb09ee9dac0f153537b92432e4a4665b6febaaf9