Malware Analysis Report

2025-01-03 08:24

Sample ID 240704-fgtkdsxdlc
Target 6666.apk
SHA256 0c97ebf202351d579c1151ea79edadb1195bb5b8823b7d73b600b15f4f13eb8a
Tags
metasploit evasion impact
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0c97ebf202351d579c1151ea79edadb1195bb5b8823b7d73b600b15f4f13eb8a

Threat Level: Known bad

The file 6666.apk was found to be: Known bad.

Malicious Activity Summary

metasploit evasion impact

Metasploit family

Metasploit payload

Loads dropped Dex/Jar

Requests dangerous framework permissions

Acquires the wake lock

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-04 04:51

Signatures

Metasploit family

metasploit

Metasploit payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write and read the user's call log data. android.permission.WRITE_CALL_LOG N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-04 04:51

Reported

2024-07-04 04:54

Platform

android-x86-arm-20240624-en

Max time kernel

130s

Max time network

186s

Command Line

com.metasploit.stage

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.metasploit.stage/files/6s09br.jar N/A N/A
N/A /data/user/0/com.metasploit.stage/files/6s09br.jar N/A N/A
N/A /data/user/0/com.metasploit.stage/files/met.jar N/A N/A
N/A /data/user/0/com.metasploit.stage/files/met.jar N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.metasploit.stage

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.metasploit.stage/files/6s09br.jar --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/user/0/com.metasploit.stage/files/oat/x86/6s09br.odex --compiler-filter=quicken --class-loader-context=&

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.metasploit.stage/files/met.jar --output-vdex-fd=44 --oat-fd=46 --oat-location=/data/user/0/com.metasploit.stage/files/oat/x86/met.odex --compiler-filter=quicken --class-loader-context=&

id

getprop ro.build.version.release

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
BR 144.22.38.242:6666 tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

/data/data/com.metasploit.stage/files/6s09br.jar

MD5 dbbd51eee2aac8a8d440f5bb9aafdce3
SHA1 6c2f4df910ab38fcab2d2abc18a7021d25ce9bcc
SHA256 02e2b9b1c8e04cd09054dde4df5260ef33574fb1b6106659c23ae36c5f49603d
SHA512 8db4da89e0633336a88ccfde568b48c8818a2ecdf6c60db76118006cf07502292d9b788d01d774db6be4dd7031cb61cef2aa9d497259048c168b8244f6fa757f

/data/user/0/com.metasploit.stage/files/6s09br.jar

MD5 cfb84ada25534b7e1c598210f1b4a23b
SHA1 f6f735f682eca65554e593a026fe26c75ece7f1d
SHA256 5fbca4c9e95c21192b6c0669962b78363bef0a587702b1bc01b1c1e081d34be0
SHA512 2c8c662aec53796c2bb661cefc9e49fc3d66c7e51b02f5add63725fca7ee64ea357dfc0a6d0bf0d1457cbf0b412de7a571374f94d771168b9a2fea0b0b847372

/data/user/0/com.metasploit.stage/files/6s09br.jar

MD5 43bdd6c3b9f9dbb3739cb2a0105c2b67
SHA1 85ea490fc77c2aa39c8d71d21fa2f9de6f326897
SHA256 35cb7160d9ae3fb328eb6e87abdd8dfc896c915d31b0efbdd9768e7a4094ad47
SHA512 a2081fdb9ab02725dfee3acaf47699243933d21af2265e5a3b3e08dec98933d588d770ae3c5ed63862931fd9829623c11e80aac9b5ea1e1d82b54ae108b5d5dd

/data/data/com.metasploit.stage/files/met.jar

MD5 281c9d5a4014bb0c340f84ed47e2ed0d
SHA1 4bbee90fcc1ba4271806769df315a80559863313
SHA256 c908fc3f589e5f8589ca7698462f0b08383887a331f792d19effa12c2b1282aa
SHA512 96b3aaa3e04ddd3cfd376e1b41b83fa4a39416e1197d43de75b52c10132240f5da6ed35c6fddece5f2c1efb077c6560d2c45d512aa1bac5ca2b0b6b638ea58f7

/data/user/0/com.metasploit.stage/files/met.jar

MD5 402d99e71a07ce7abbcf636dea997f11
SHA1 403cda18669e038b75176c175af004753515c60f
SHA256 fdf8db5a29fce18bf80acd3dec49c30ab7962038ebdff2c7ed9b0a413550d6dc
SHA512 a3a6251bedb46cfb02cb151557d498fc48ee6dec5a6546badef7a8f501de57527dcf1fa6b67ec459ecd394ce9258734b4e43ac088e5b19fd9d7f98cac4c99399

/data/user/0/com.metasploit.stage/files/met.jar

MD5 4a87713e17052e324c77abe59d4cb325
SHA1 5eec2e6d727d1058aa7d16facd939d540e354fbb
SHA256 10a09810f24fbe1b2bbcc23c787d97a7f730c9b7e97c86007da311147de0e344
SHA512 0976acaf3d20226d3aa0beda9eaaeb97afffdd9a3a2ca2a8655dddf69b2c5a04c7a0eb4b3fd232946529409dfb4a1e0bc6e234334bc030bd4e76966e3b3e2048

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-04 04:51

Reported

2024-07-04 04:54

Platform

android-x64-20240624-en

Max time kernel

67s

Max time network

142s

Command Line

com.metasploit.stage

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.metasploit.stage/files/k25b0o.jar N/A N/A
N/A /data/user/0/com.metasploit.stage/files/met.jar N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.metasploit.stage

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
BR 144.22.38.242:6666 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.178.8:443 ssl.google-analytics.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

/data/data/com.metasploit.stage/files/k25b0o.jar

MD5 dbbd51eee2aac8a8d440f5bb9aafdce3
SHA1 6c2f4df910ab38fcab2d2abc18a7021d25ce9bcc
SHA256 02e2b9b1c8e04cd09054dde4df5260ef33574fb1b6106659c23ae36c5f49603d
SHA512 8db4da89e0633336a88ccfde568b48c8818a2ecdf6c60db76118006cf07502292d9b788d01d774db6be4dd7031cb61cef2aa9d497259048c168b8244f6fa757f

/data/user/0/com.metasploit.stage/files/k25b0o.jar

MD5 cfb84ada25534b7e1c598210f1b4a23b
SHA1 f6f735f682eca65554e593a026fe26c75ece7f1d
SHA256 5fbca4c9e95c21192b6c0669962b78363bef0a587702b1bc01b1c1e081d34be0
SHA512 2c8c662aec53796c2bb661cefc9e49fc3d66c7e51b02f5add63725fca7ee64ea357dfc0a6d0bf0d1457cbf0b412de7a571374f94d771168b9a2fea0b0b847372

/data/data/com.metasploit.stage/files/met.jar

MD5 281c9d5a4014bb0c340f84ed47e2ed0d
SHA1 4bbee90fcc1ba4271806769df315a80559863313
SHA256 c908fc3f589e5f8589ca7698462f0b08383887a331f792d19effa12c2b1282aa
SHA512 96b3aaa3e04ddd3cfd376e1b41b83fa4a39416e1197d43de75b52c10132240f5da6ed35c6fddece5f2c1efb077c6560d2c45d512aa1bac5ca2b0b6b638ea58f7

/data/user/0/com.metasploit.stage/files/met.jar

MD5 402d99e71a07ce7abbcf636dea997f11
SHA1 403cda18669e038b75176c175af004753515c60f
SHA256 fdf8db5a29fce18bf80acd3dec49c30ab7962038ebdff2c7ed9b0a413550d6dc
SHA512 a3a6251bedb46cfb02cb151557d498fc48ee6dec5a6546badef7a8f501de57527dcf1fa6b67ec459ecd394ce9258734b4e43ac088e5b19fd9d7f98cac4c99399

Analysis: behavioral3

Detonation Overview

Submitted

2024-07-04 04:51

Reported

2024-07-04 04:54

Platform

android-x64-arm64-20240624-en

Max time kernel

130s

Max time network

156s

Command Line

com.metasploit.stage

Signatures

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.metasploit.stage/files/5zhiyx.jar N/A N/A
N/A /data/user/0/com.metasploit.stage/files/met.jar N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.metasploit.stage

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.179.238:443 tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.169.46:443 android.apis.google.com tcp
BR 144.22.38.242:6666 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.180.8:443 ssl.google-analytics.com tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp

Files

/data/user/0/com.metasploit.stage/files/5zhiyx.jar

MD5 dbbd51eee2aac8a8d440f5bb9aafdce3
SHA1 6c2f4df910ab38fcab2d2abc18a7021d25ce9bcc
SHA256 02e2b9b1c8e04cd09054dde4df5260ef33574fb1b6106659c23ae36c5f49603d
SHA512 8db4da89e0633336a88ccfde568b48c8818a2ecdf6c60db76118006cf07502292d9b788d01d774db6be4dd7031cb61cef2aa9d497259048c168b8244f6fa757f

/data/user/0/com.metasploit.stage/files/5zhiyx.jar

MD5 cfb84ada25534b7e1c598210f1b4a23b
SHA1 f6f735f682eca65554e593a026fe26c75ece7f1d
SHA256 5fbca4c9e95c21192b6c0669962b78363bef0a587702b1bc01b1c1e081d34be0
SHA512 2c8c662aec53796c2bb661cefc9e49fc3d66c7e51b02f5add63725fca7ee64ea357dfc0a6d0bf0d1457cbf0b412de7a571374f94d771168b9a2fea0b0b847372

/data/user/0/com.metasploit.stage/files/met.jar

MD5 281c9d5a4014bb0c340f84ed47e2ed0d
SHA1 4bbee90fcc1ba4271806769df315a80559863313
SHA256 c908fc3f589e5f8589ca7698462f0b08383887a331f792d19effa12c2b1282aa
SHA512 96b3aaa3e04ddd3cfd376e1b41b83fa4a39416e1197d43de75b52c10132240f5da6ed35c6fddece5f2c1efb077c6560d2c45d512aa1bac5ca2b0b6b638ea58f7

/data/user/0/com.metasploit.stage/files/met.jar

MD5 402d99e71a07ce7abbcf636dea997f11
SHA1 403cda18669e038b75176c175af004753515c60f
SHA256 fdf8db5a29fce18bf80acd3dec49c30ab7962038ebdff2c7ed9b0a413550d6dc
SHA512 a3a6251bedb46cfb02cb151557d498fc48ee6dec5a6546badef7a8f501de57527dcf1fa6b67ec459ecd394ce9258734b4e43ac088e5b19fd9d7f98cac4c99399