Malware Analysis Report

2024-07-28 11:42

Sample ID 240619-bmbjjsvgkk
Target 3d287d481cbc7233cd2aa7d56738c6bbb082a5f505c04b79ef147a7e8187de9d.apk
SHA256 3d287d481cbc7233cd2aa7d56738c6bbb082a5f505c04b79ef147a7e8187de9d
Tags
ermac hook banker collection credential_access discovery evasion execution impact infostealer persistence rat stealth trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3d287d481cbc7233cd2aa7d56738c6bbb082a5f505c04b79ef147a7e8187de9d

Threat Level: Known bad

The file 3d287d481cbc7233cd2aa7d56738c6bbb082a5f505c04b79ef147a7e8187de9d.apk was found to be: Known bad.

Malicious Activity Summary

ermac hook banker collection credential_access discovery evasion execution impact infostealer persistence rat stealth trojan

Ermac2 payload

Hook family

Hook

Ermac family

Removes its main activity from the application launcher

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

Queries information about running processes on the device

Queries the phone number (MSISDN for GSM devices)

Obtains sensitive information copied to the device clipboard

Makes use of the framework's Accessibility service

Requests disabling of battery optimizations (often used to enable hiding in the background).

Performs UI accessibility actions on behalf of the user

Queries information about the current Wi-Fi connection

Makes use of the framework's foreground persistence service

Declares broadcast receivers with permission to handle system events

Queries the mobile country code (MCC)

Declares services with permission to bind to the system

Acquires the wake lock

Requests dangerous framework permissions

Reads information about phone network operator.

Uses Crypto APIs (Might try to encrypt user data)

Schedules tasks to execute at a specified time

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-19 01:15

Signatures

Ermac family

ermac

Ermac2 payload

Description Indicator Process Target
N/A N/A N/A N/A

Hook family

hook

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 01:15

Reported

2024-06-19 01:18

Platform

android-x86-arm-20240611.1-en

Max time kernel

55s

Max time network

186s

Command Line

com.lasujokeyoye.nafeyi

Signatures

Hook

rat trojan infostealer hook

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

banker discovery

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.lasujokeyoye.nafeyi

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.201.106:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp

Files

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-journal

MD5 e8cdfb28c7ccab9586ada3697acfb720
SHA1 7f2de1095cf489ff790ba45451677c73be082006
SHA256 bc7de6e60c08989fa0d2b962fdb528ee240177057f06cbb899f0085902679845
SHA512 c44b682965984c77b940150ca831500104dd3f222d4b26ff9e473f9d75255c1520ea4a060c2fdeaf2a2d66e78c61f86f95e03727273e01c8dcd7f31dfe5c5246

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 e2c749c33f86d13c6905c6cd3c228602
SHA1 2074c3d54422d29751f76558acc3f72f53a5710b
SHA256 40804ba37ba54e8cb73f2baf58185ac435c73fa86046ea04d282c30358b55961
SHA512 50f18b50a9dabb682877087f81fab28612a87ffadd10973129720ae730f55cd883a1d06817e81b7bd961ce75491c4a687d6e7d8ee5747ed3160dce75df3680c8

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 fcf6c2b3421f486ed23a197a2a5f70b5
SHA1 483e6ff7f8db10420f9f89a9408ae2882c710c68
SHA256 e245fe5c853178563ec0698bf696b25cea9c39460949454cce30f1cb5a7497b4
SHA512 56fe798eadca4a1f582725ec0239b82d0da95e4f87245fea126697d9438f5938b0a9b2e90390017ac3434f363b63238f2e200cfc0e097dbbacc5e620ebc4d8d0

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 27e942e9f201b105b0b92825533f7d42
SHA1 3f74fd546ca6d7f94e65e64d0c48508f966b35d1
SHA256 3a9ec558c9c0db550ed43eba654e7a398fa52141456565ed00a90614a9a5a8af
SHA512 179e9b59895605f67e54047af5f70b1c1f29e3f7b0f12b6b220f6183d42dbaed534d59076a9d113c4fdb83d568bea757fb4c0595715acb6b44dc261bca8677a2

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 01:15

Reported

2024-06-19 01:18

Platform

android-x64-20240611.1-en

Max time kernel

33s

Max time network

187s

Command Line

com.lasujokeyoye.nafeyi

Signatures

Hook

rat trojan infostealer hook

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.lasujokeyoye.nafeyi

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 null udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 142.250.200.14:443 tcp
GB 172.217.169.66:443 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp
GB 216.58.204.78:443 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp

Files

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-journal

MD5 3b6ce16f26724be19dc2446af89fe845
SHA1 5a7f779b94493c4caff03ae8b39f7b2384518580
SHA256 3c8304d8336dcc2caee5123d7d7fdc4ace94e3d70780aac221a5bff57352d705
SHA512 55fc960b7fb197ccab654ee9264d79d97f940fc5c9b3cee83d7b598cdb6977fccc379063a0fe18d595dfc1b13ec349769bb5ef9243dc3d4bd3699e00395b5829

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb

MD5 f2b4b0190b9f384ca885f0c8c9b14700
SHA1 934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA256 0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512 ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 758fb98b533c3bd14a5aafccbb20fc10
SHA1 b135b07b03c590c9f340f606340a4e789a2af40e
SHA256 b10e699c1b95f117d1db45884980ab79cf6782906557aef5aad4377bc7f6958b
SHA512 6061e39ad9f8113514839464e7c25e56719237808d05b75e5bb91349c0b230c9be5ddef121abc4ecb3758b25b7befc6dbb3e470b64e1861bcce2b871e354c73a

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 3a79542cb8fab7aab1e7dbc2e8eec7c6
SHA1 a58cb52515bbac0d84663f77d65d084882a30f2e
SHA256 d906ce69bc758d52af665c5a74300e16f5118776cfad0784bb7df357eaf6b34d
SHA512 70f0c1f93abc672c177e139c3a2a43010534c0ac8903a880ee1ab5471221b3441d7e80a35afd56469f576032121f818f067d129ce724b1d8ad4621b25c535612

/data/data/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 ec8590ff55ca2ce488baa5c59dfc7218
SHA1 692385f08a526a9f97a55114cc1cfc78620a7eba
SHA256 bbbe342420264a8dc7fd3bf6c9f9c668e2fad4df309c8e95a0b94919b6472e4d
SHA512 6078121abbc0f84a226a90a2ee167a4a0902035b8c1cfba93e2250fcaf22a584706bfec81f24024f6e33910e85f57e3fd275f5fbd8662c6f273f8e0d3a8fe525

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-19 01:15

Reported

2024-06-19 01:18

Platform

android-x64-arm64-20240611.1-en

Max time kernel

69s

Max time network

187s

Command Line

com.lasujokeyoye.nafeyi

Signatures

Hook

rat trojan infostealer hook

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A

Obtains sensitive information copied to the device clipboard

collection credential_access impact
Description Indicator Process Target
Framework service call android.content.IClipboard.addPrimaryClipChangedListener N/A N/A

Queries information about running processes on the device

discovery
Description Indicator Process Target
Framework service call android.app.IActivityManager.getRunningAppProcesses N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.lasujokeyoye.nafeyi

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.212.234:443 tcp
GB 216.58.212.234:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.178.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 null udp
GB 216.58.212.196:443 tcp
GB 216.58.212.196:443 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp
TR 94.156.8.110:3434 94.156.8.110 tcp

Files

/data/user/0/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-journal

MD5 cb374fa9ec2abdb9c4120f0ea4e197d9
SHA1 3973201c273ad3872f5589b1a3dd1008768076a7
SHA256 11283824af2f0e51ec90e06bc985032f123a35aa66845380d5a39cea3a5d072b
SHA512 ade303a16497c1658b012e7940522e2cd200185513392fc8075457b7b9a1cdba02fececaa9217c0206cfb3d930c8f207eb0ee37bcc271723631f08b3de5372c2

/data/user/0/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb

MD5 7e858c4054eb00fcddc653a04e5cd1c6
SHA1 2e056bf31a8d78df136f02a62afeeca77f4faccf
SHA256 9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512 d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

/data/user/0/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/user/0/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 ca02ebdca39eeb2b6883d1b3b55b962d
SHA1 be975ca6a5dd01a229a477b6c70f9060763d5ddf
SHA256 fc2d0e8c6df7c5a76c6f1a70d97b13c26ba08f8f1e02c697396d01a2b10a8cfc
SHA512 4e6e76fcf77db56771a1974a3ea7f29e1c17c170c344d53ce959bfd160a73fa493a4319f6cc8348c6ed00c1237e3232cd40c4ad63468bf16c3b0c25eb3e18a61

/data/user/0/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 f0d0826431c6df4df898ac7db2d562ec
SHA1 e7658781977dc5f34b3f026839c5974611261fca
SHA256 88d218cb9bacaf5a69405326fc794edfcd01afcc26afb48840c7be069cf9050c
SHA512 499a5de064ac86254fc08204c028126d38599afaa97aa166711b05b105a75d60d3af3947cdab6eafd4160895998b328d1e9e441333e73c7bbdc6eae2f11aec21

/data/user/0/com.lasujokeyoye.nafeyi/no_backup/androidx.work.workdb-wal

MD5 2baf32b8450085d3fca6cd23bc44e202
SHA1 363c223a4c801fcbb2d861c314f8a4d91a3786e9
SHA256 64758b5881196343b47635194f11e565579c80fa15d5669d29c29d6032d051ca
SHA512 f073445d85e02012a030bec10298c36c62cdd5e3415601dbf79159dde79754a3f155c036553a442ea2e3e8c8cb60866c08f74159649afaf3e9549e8961db5350