Analysis

  • max time kernel
    169s
  • max time network
    164s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    02/08/2024, 22:05

General

  • Target

    042d8d71edc75ee7d63d9884e4b5e012069e75e3ff651f5317f62b293328a019.apk

  • Size

    3.6MB

  • MD5

    278f39a14a7cabf6adcfe1efe2a43cc4

  • SHA1

    8567661f9bb090d8ee9a326f34df095c651040a4

  • SHA256

    042d8d71edc75ee7d63d9884e4b5e012069e75e3ff651f5317f62b293328a019

  • SHA512

    8150d1424a6e2233757601d8d93beb6caa93be444d17e43e1a86fdd908b60ffe35b7d06a3d95c2455cd34c1600d1aec6f6114816b331fb6bca8fd19856ad45a7

  • SSDEEP

    98304:2pdlp7qgNdCXFcPLazjGgsqPrjCJXJ45EPPR:WdldqM4F8LazfRSJ5+KR

Malware Config

Signatures

  • BlackRock

    BlackRock is an android banker based on Xerxes banking Trojan.

  • BlackRock payload 2 IoCs
  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Requests enabling of the accessibility settings. 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.dvygvwkxhn
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Performs UI accessibility actions on behalf of the user
    PID:4269
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.dvygvwkxhn/cache/payload.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.dvygvwkxhn/cache/oat/x86/payload.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4293
  • com.dvygvwkxhn:cproc
    1⤵
    • Loads dropped Dex/Jar
    • Requests enabling of the accessibility settings.
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4318

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.dvygvwkxhn/cache/oat/payload.jar.cur.prof

    Filesize

    116B

    MD5

    0f30fc66a0c9b8bd88784a19e348d692

    SHA1

    9d131f040930a40d369a3d913a9eac13bf07b695

    SHA256

    41aabdd030a90282f902d73a7427d1ba24e4826f842f9df488c2ec1e019e34f0

    SHA512

    1ff41fb701181bc92d543c0dff4d095862a7934dd62f6ab3a0162b3aee76ad0870201427b668eaed408af26d77ca98bedc13e7b1824b82e1709fc1fc7bd168fe

  • /data/data/com.dvygvwkxhn/cache/payload.jar

    Filesize

    131KB

    MD5

    13e802516c054837ce9b292d26b028e7

    SHA1

    d81f8f2f8fe97be69b569c4df61ac235381631d6

    SHA256

    26134dfc90cea1a38bba640d34dd266b2bdd766cb71b52344cdbec76427b4533

    SHA512

    027f0f77f39f87466bcf38df6cd319cf00d73ccdaeb399419d52ca289495dda28f073ed26c6e5faffecf57362cdc41f677abbf4468115f508f36f38464bb5aca

  • /data/user/0/com.dvygvwkxhn/cache/payload.jar

    Filesize

    283KB

    MD5

    8816af0c9745627623670f1b8d32dc80

    SHA1

    3cec82b94979bba7f9e094f14d94c05be7cd9555

    SHA256

    8f9bcad454b3850a17890b315e67cd247cc2a470b0bd83e832a02856bf8ec0d9

    SHA512

    865e5930ed10689a6f16c997bc73fbdd970d1983e3f636b03958820f0b1e56a2bcce1e2fa34766bc802c27a92d82fe23739227ecd43ef81bba9de02e94ade7c3

  • /data/user/0/com.dvygvwkxhn/cache/payload.jar

    Filesize

    283KB

    MD5

    b5e89a68755d11a35b99a399032b7384

    SHA1

    f0094ed6055a4ceddd2b751fdce9ff218c24c149

    SHA256

    a590905d51fc76b99cc460f9e6a4001496de4ce7b9c25e1c286467a9135e87d6

    SHA512

    cccf110a54617ba8e6312761663419b2936ae7fed5c5e77f162caf75914503270deaad7e6a1499b6f81d9e07ad3880e6ab583e0b5b1691c9e4bca448680ee3e0