Malware Analysis Report

2024-10-19 11:58

Sample ID 240704-1z443atgkc
Target 8883996a0058c9aec7d830934b97b989938ba41cd58b817438b3456de897e9a2.bin
SHA256 8883996a0058c9aec7d830934b97b989938ba41cd58b817438b3456de897e9a2
Tags
collection credential_access evasion persistence stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

8883996a0058c9aec7d830934b97b989938ba41cd58b817438b3456de897e9a2

Threat Level: Likely malicious

The file 8883996a0058c9aec7d830934b97b989938ba41cd58b817438b3456de897e9a2.bin was found to be: Likely malicious.

Malicious Activity Summary

collection credential_access evasion persistence stealth trojan

Removes its main activity from the application launcher

Makes use of the framework's Accessibility service

Loads dropped Dex/Jar

Acquires the wake lock

Performs UI accessibility actions on behalf of the user

Requests disabling of battery optimizations (often used to enable hiding in the background).

Requests enabling of the accessibility settings.

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

Declares services with permission to bind to the system

Makes use of the framework's foreground persistence service

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-04 22:06

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read video files from external storage. android.permission.READ_MEDIA_VIDEO N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to recognize physical activity. android.permission.ACTIVITY_RECOGNITION N/A N/A
Allows an application to write the user's calendar data. android.permission.WRITE_CALENDAR N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an application to read audio files from external storage. android.permission.READ_MEDIA_AUDIO N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Required to be able to discover and pair nearby Bluetooth devices. android.permission.BLUETOOTH_SCAN N/A N/A
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an app to access location in the background. android.permission.ACCESS_BACKGROUND_LOCATION N/A N/A
Allows the app to answer an incoming phone call. android.permission.ANSWER_PHONE_CALLS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows financial apps to read filtered sms messages. android.permission.SMS_FINANCIAL_TRANSACTIONS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to access data from sensors that the user uses to measure what is happening inside their body, such as heart rate. android.permission.BODY_SENSORS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Required to be able to connect to paired Bluetooth devices. android.permission.BLUETOOTH_CONNECT N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read image files from external storage. android.permission.READ_MEDIA_IMAGES N/A N/A
Allows an application to receive WAP push messages. android.permission.RECEIVE_WAP_PUSH N/A N/A
Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS N/A N/A
Allows an application to use SIP service. android.permission.USE_SIP N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-04 22:06

Reported

2024-07-04 22:19

Platform

android-x86-arm-20240624-en

Max time kernel

174s

Max time network

181s

Command Line

nyqr.epzsj.vqgn

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A Anonymous-DexFile@0xd05cc000-0xd05f6e30 N/A N/A
N/A /data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/iace.dex N/A N/A
N/A /data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/iace.dex N/A N/A
N/A /data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/iace.dex N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

nyqr.epzsj.vqgn

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/iace.dex --output-vdex-fd=43 --oat-fd=44 --oat-location=/data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/oat/x86/iace.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 netfosite123.freeddns.org udp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
US 1.1.1.1:53 netfosite123.freeddns.org udp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp

Files

Anonymous-DexFile@0xd05cc000-0xd05f6e30

MD5 0b8acbb7c58b34500835df570a13ec69
SHA1 ebd7c817f40d8f206a6db70178c4fb5b4e08793b
SHA256 a28063669fad8546e82d3da8944c6b1f04d4d8379759c68763a3f1154425c5d8
SHA512 2613218ce81b985035555ba59dc13c3a4bb263a6e5ca3a83811aea00969434687e0c38f9377eb393a5955ce0ba426c3d1f3600ed290939dbbada8414dc8b92bb

/data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/iace.dex

MD5 0bdfe786a5f5cfe2dc096c145f008cbd
SHA1 955448fbba0ade245e7fbcbbc7a508c3384f7cb3
SHA256 cd3687c72dcc8b9596b1a4887d69a08d9208122bbcf1e627023bc6056aed161f
SHA512 a4767330f66fc3fb272b32f9363213e6bd166cc3d697f6e3cfcfb568ffb1d841dcc7b4db1f5c82bcfd6e5a7c4337e9c9db0fb19ae84a52c8c716228c41939e27

/data/data/nyqr.epzsj.vqgn/files/Factory/Plugins/oat/iace.dex.cur.prof

MD5 5e6be29ca45d6d4272a52770e9958b26
SHA1 e711fd7de55319ff37b98b0a62b4072955ecf716
SHA256 adc3b50039d350c7c15632fdeb4d5046dd081f6289de1012f58d5768b281c7f3
SHA512 204a3d1d9d1f1b9669403847a0e1c8b57a0091d0557f04dc47c7574aab4188bcbb32d7ef4aa86d620e9c51c07efba9986d0ef34fde0dae63b5eb9a4b24f81f87

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-04 22:06

Reported

2024-07-04 22:19

Platform

android-x64-20240624-en

Max time kernel

179s

Max time network

180s

Command Line

nyqr.epzsj.vqgn

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/nyqr.epzsj.vqgn/[email protected] N/A N/A
N/A /data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/iace.dex N/A N/A
N/A /data/user/0/nyqr.epzsj.vqgn/files/Factory/Plugins/iace.dex N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

nyqr.epzsj.vqgn

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 netfosite123.freeddns.org udp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.200.42:443 semanticlocation-pa.googleapis.com tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
GB 142.250.179.234:443 semanticlocation-pa.googleapis.com tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
GB 216.58.201.98:443 tcp
GB 172.217.169.46:443 tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
US 1.1.1.1:53 netfosite123.freeddns.org udp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp
MD 45.84.0.182:4114 netfosite123.freeddns.org tcp

Files

/data/user/0/nyqr.epzsj.vqgn/[email protected]

MD5 0b8acbb7c58b34500835df570a13ec69
SHA1 ebd7c817f40d8f206a6db70178c4fb5b4e08793b
SHA256 a28063669fad8546e82d3da8944c6b1f04d4d8379759c68763a3f1154425c5d8
SHA512 2613218ce81b985035555ba59dc13c3a4bb263a6e5ca3a83811aea00969434687e0c38f9377eb393a5955ce0ba426c3d1f3600ed290939dbbada8414dc8b92bb

/data/data/nyqr.epzsj.vqgn/oat/x86_64/[email protected]

MD5 9c3df463e8f1314873bb7e05de7b5337
SHA1 717b1306ac4bf36e6be1506b8147b2bd4cdd94e6
SHA256 d99b25291d438e40e3fabe48a623e9124456eb6e08125ea09f3ba173ba483dbd
SHA512 41e16e8dbee1df9d809a271e38ac257c2d2d51761748c0e80a4af9615bf3a2accf657fdeb7731460848c11f8c6fb244f5b62490f758259ce6b5c95f4c1f08682

/data/data/nyqr.epzsj.vqgn/files/Factory/Plugins/oat/iace.dex.cur.prof

MD5 6f5d1fd8fd888f25c254e909c5d6c891
SHA1 aca016695adf8d85b57e3e0412090e5f7705896b
SHA256 702c07147998c8d532a64f74df45e1827e1cbe9c32f6667f4af9560bd8e345d7
SHA512 1b6ff4b76dbb4fe8fad9a5a1eca4499e304edecb6323dd3a3874981d9f46715815c54917bd1d572ae05287e3c4e7a35f352d050cbfdf78a49c77cc7dc3de9870

Analysis: behavioral3

Detonation Overview

Submitted

2024-07-04 22:06

Reported

2024-07-04 22:16

Platform

android-x64-arm64-20240624-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A