Analysis
-
max time kernel
74s -
max time network
82s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
27-06-2024 23:31
Behavioral task
behavioral1
Sample
ee5f5ebd0297cc3a3bd0f59c8544610ec901fe9a23b02b64b8345cccd96830e3.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
ee5f5ebd0297cc3a3bd0f59c8544610ec901fe9a23b02b64b8345cccd96830e3.apk
Resource
android-x86-arm-20240624-en
General
-
Target
ee5f5ebd0297cc3a3bd0f59c8544610ec901fe9a23b02b64b8345cccd96830e3.apk
-
Size
1.2MB
-
MD5
371e5e59cf3431a954ce943f1ca3fd03
-
SHA1
7d557210694d035c769c3f5b04eea12a8393a3c8
-
SHA256
ee5f5ebd0297cc3a3bd0f59c8544610ec901fe9a23b02b64b8345cccd96830e3
-
SHA512
79f906f318f23276ca0f3ee2c9a89d83266d62d5d7edb4ec7acd81dbb9cee8c30b6563a24a9a0de91370e2cb8374727908e611e094df6830c384acedde3954c0
-
SSDEEP
24576:fJsTe9xlM8jktafUqvBDE80lIM0ZJD5c+BSbvPwbgSq7eEU:fJsTmLIaLvxE3lI7JuOUqgSj7
Malware Config
Extracted
hook
http://http://159.89.186.168:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.datowajejiyili.fatogilo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.datowajejiyili.fatogilo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.datowajejiyili.fatogilo -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.datowajejiyili.fatogilo -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.datowajejiyili.fatogilo -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.datowajejiyili.fatogilo -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.datowajejiyili.fatogilo -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.datowajejiyili.fatogilo -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.datowajejiyili.fatogilo -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.datowajejiyili.fatogilo -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.datowajejiyili.fatogilo
Processes
-
com.datowajejiyili.fatogilo1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4312
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50eb157e1a86d4d00aa601dd2f6ff3ee3
SHA1fee434f784e73cc7916322e949f727caf8363102
SHA256b9a8194b71a046e8c0eb30995827b582b4bea834f630a5df2483b778a7d7d8a4
SHA512b9b79b8c3af8a3f140df230fd89e95206358ba50ff214e7323a2dbbe2937b795f970e588302ffd5d721318bd597ce0a27af26d6cdb07f45569c30209845082a8
-
Filesize
512B
MD5685958e6075aab5bd19602dfa8286d64
SHA19f316fea74af52f59f040367cdcf112f989420a6
SHA2561237c222698d7e8f751575e3239c453815372cb29c9ebb9fbffa0844e9033f7e
SHA512f64f98a69150a949de328d01104b261f0d348d6f5253fff56e7dc1a44daf69b903d9ba43b2ec307b103cac1b63aa82511085abe098d506e7a8bd0ec13f168c67
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5313689c7d8520f14a263c0865ba9c531
SHA19a35b0caab032668563d35fdd16aaf4e72917081
SHA256d0d4da287728bf1a7b168e88a49887c780ad2846823e1af6db9f7f31e7dfff65
SHA5124e04c94b4ad0621acb012136f9ab7f8f08e36bd45253e28d54c73a22a17e008902353e0713eca602a2e69eeb59395c3cc2d4f7507793bbcf75dba510eb238e1e
-
Filesize
108KB
MD5bd37790cac10851f41c04041ed2ddfd5
SHA1ebce262716a10ae99451912b6292136fa8283aa5
SHA25622047c5c8db9975362aef5fd1850651c1e6c125973232ddd4084c6a085657e72
SHA51258e63b4406d049a2144f6048168a837051dc21550de82bef9be7d5dec3d701384d6d6d37789b3260e73a5b760ac6b9d68ab571e494a0eafba4c3c067ba7e1ac8
-
Filesize
173KB
MD5bb8a25274325457192b53ad474e357f1
SHA1f10e9cdbd38357d3b72ae9ddc5052682c5ef38d4
SHA2563046b51d715e037dd394d4ed9efb4d3abe144185d1ee18eb399c9deadf56da38
SHA512dab462108c41c691a508341e17f5461ad2219a52772aa5def5f1bdf0681991aca7ce627a9137913265fa6d50d361ca7d5da27611109b0b48abbc2f959ee758cd