Analysis
-
max time kernel
173s -
max time network
188s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06-08-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
ed9fae343cc367c1e15cd013ae894c2fa4647800fbac275b087edf193c9e6d45.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ed9fae343cc367c1e15cd013ae894c2fa4647800fbac275b087edf193c9e6d45.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ed9fae343cc367c1e15cd013ae894c2fa4647800fbac275b087edf193c9e6d45.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ed9fae343cc367c1e15cd013ae894c2fa4647800fbac275b087edf193c9e6d45.apk
-
Size
4.2MB
-
MD5
1c592a7e378ca7abf2ddd32c34494582
-
SHA1
b49fc0072a59b5a7e4116393dab023e43e5f9406
-
SHA256
ed9fae343cc367c1e15cd013ae894c2fa4647800fbac275b087edf193c9e6d45
-
SHA512
28dc66fca2e1d28041be68e5ba1cd8e6150dbe7c6bd9ea075326e95c06474e212fbf7f8e06286fe0763c7d9db987d6820a5c07f8cacc3866395a6837131d757a
-
SSDEEP
98304:x4orSQoCgovp/Kc9NKpMoweNE3agQhPXMKsytDpWEWlm+OIbuWkLlWy:JrSgZ/Kc9feNE3mPJDTX/RIbBGlWy
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.atbvhuuaj.kebbhnabo/app_dex/classes.dex 4267 com.atbvhuuaj.kebbhnabo /data/user/0/com.atbvhuuaj.kebbhnabo/app_dex/classes.dex 4294 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.atbvhuuaj.kebbhnabo/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.atbvhuuaj.kebbhnabo/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.atbvhuuaj.kebbhnabo/app_dex/classes.dex 4267 com.atbvhuuaj.kebbhnabo -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.atbvhuuaj.kebbhnabo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.atbvhuuaj.kebbhnabo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.atbvhuuaj.kebbhnabo -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.atbvhuuaj.kebbhnabo -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.atbvhuuaj.kebbhnabo -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.atbvhuuaj.kebbhnabo -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.atbvhuuaj.kebbhnabo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.atbvhuuaj.kebbhnabo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.atbvhuuaj.kebbhnabo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.atbvhuuaj.kebbhnabo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.atbvhuuaj.kebbhnabo -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.atbvhuuaj.kebbhnabo -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.atbvhuuaj.kebbhnabo -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.atbvhuuaj.kebbhnabo -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.atbvhuuaj.kebbhnabo -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.atbvhuuaj.kebbhnabo -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.atbvhuuaj.kebbhnabo -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.atbvhuuaj.kebbhnabo
Processes
-
com.atbvhuuaj.kebbhnabo1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4267 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.atbvhuuaj.kebbhnabo/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.atbvhuuaj.kebbhnabo/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4294
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD522c0f92674236c0a5c3bb8d0d24f9cfc
SHA1a50124b5b7d5a3f479685c0aa2eb2984dd35fbfc
SHA25664455577f55efcdbdbd955c3b332c193c8c5faea2638b70d29179b59a59c2bd7
SHA512bf22637f57684e1f11a944ab38fb3ddb1b8b7094cf2b68aaebf6c899c3bbcf29107c53644a45bfafe6a2a7aa452071862836d428cc1a3acc8d50526594d22db3
-
Filesize
1.0MB
MD5e86db225046d1a0cbcc911f4ac90420a
SHA10ae3ec461043b86ea5dd5e7912f90b4778610d67
SHA256b99e7709210b971eb35698462b7845b47e93703fa53931ab2942f39c7f7815f2
SHA51235cb69c93e3a55faf1d322b7200a1162df3f9a811c390f86346cc288b4b9ff3c33cf263a6fcdb30cde3a3e959f7086d151e4b263c9bd9b06c6928d169a3fd4ae
-
Filesize
1.0MB
MD5a386fb69ba801d1da9202f3a80a39eec
SHA12778d3aa6aa6994a98943b3efa98b9c9ab0cb21e
SHA2563ef9451be9de18ea91ed630561853448c346e78ed121fc0fc03988187af39568
SHA5127f52c87394507674273dec6114f39a1d5dc508e735e9985035119c59c1d647b4a8fce303abb6afa19f01f88d8436386f46362a39aebc933480a123605ffcbf83
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5975214af6d6539961348a291444811aa
SHA1b0cf24e32b72fd92c22d29a43c22b5aad546a363
SHA2562bf4cdc336213164f22365b58eb8c28c16659d96034dbc869a3bbee9cf87ac6c
SHA512703c90606685a4b0b7c6c9d41893795b69957f0ab951caeed843a66fb9d1fd511d916089fc688036fdc20aba71c7e031fa34edbb249ff270da5b999f35ad1f29
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD57830a9f9a86279a848dfed24cc9ef89f
SHA1e995278c32faaef11b2b4b683f04991c710b4731
SHA256c8dbdeb66e1619d92453c2f5c188e920a650c814e5564ea2c28afcec87ed1a2c
SHA512b2139c3505a8eac22b600bfe29ff5d54bd96ba8ecc70ea610ae074f26e5a6de179b7f7f62df5ddad05bbcf58db8a7eb2d3b15b9be106097c82c8090a1f086a6e
-
Filesize
173KB
MD5271f3ee4e76ed1900da173ba652e21e8
SHA17164b59d710fce94277065d200defd1888712f93
SHA25670dba151c826d24e0427d24f37293c9827770a2a92184328a72dfedd89dd3202
SHA512db83141ed5a7ce9baf6fbfe5da15c029bb78d74e2e9c2c16177f1373f10ef528322c9703c46e7894cbb9694e258488b882f9d8b6f1a8f3ce9047de74288d37c4
-
Filesize
16KB
MD5c4d01773b5a12ab178b4603a7cd7ceab
SHA197e66402447ab50251103be6b3dca61747aa5a55
SHA256ace8f6ee30f58b7d87cbdbed5a6cd3657a08484ff6831165995e8a45b477de5e
SHA512e6fd5dc947a7b6062f71e765345162b08ccf9ce633aa37d94fc44b027ac0bad6dba5ca6db6e6321b5aa71a068e0a1c1e20def24046812058d97ec061bb66c6e3
-
Filesize
2.9MB
MD56f2d713693796e49fb8b6249e7a820c6
SHA1c18d988ef64a4d732e4077c8e6c11acdc8539888
SHA256bd058130a8281c2a6c42a804a32e99133c06b5409ce33eb87c9fe98d7bdfe426
SHA512ea5c1064e99859f6670ac0be98f614fe30916dca4c632dfadf76e84cdf04a07ccc5f19cf265e79a78892d9490072e24e35c3dc34a73d37743e5334d6e72d512a