Analysis
-
max time kernel
179s -
max time network
194s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
06-08-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
5483fa7885bfd9810be6b7d4a49f7e0faf88568cc3d639fdcb45eeba2b2ec6a1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5483fa7885bfd9810be6b7d4a49f7e0faf88568cc3d639fdcb45eeba2b2ec6a1.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
5483fa7885bfd9810be6b7d4a49f7e0faf88568cc3d639fdcb45eeba2b2ec6a1.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
5483fa7885bfd9810be6b7d4a49f7e0faf88568cc3d639fdcb45eeba2b2ec6a1.apk
-
Size
4.3MB
-
MD5
ab0823e2a1af26215fcf6ab4b6f5f321
-
SHA1
322b524b0c61041eb4236384dd3ce617e894b88f
-
SHA256
5483fa7885bfd9810be6b7d4a49f7e0faf88568cc3d639fdcb45eeba2b2ec6a1
-
SHA512
d8a4bede4fd052914f7c38b2401272e8e917cad43db44e49ec44dee7bc8973ef207897d077c969d4eec92f42c6d6cb2949089f9ed6d6ae933a2ee959e5c3905b
-
SSDEEP
98304:HIhrZM+goR6oYA+Ozhr/45MW7rc+jFMKrvPeE3+SoouH:ohrZMSRf//iPFHPBOSPuH
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
pid Process 4280 com.mcaamhgue.nsnnrtmey -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mcaamhgue.nsnnrtmey/app_dex/classes.dex 4280 com.mcaamhgue.nsnnrtmey /data/user/0/com.mcaamhgue.nsnnrtmey/app_dex/classes.dex 4314 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mcaamhgue.nsnnrtmey/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mcaamhgue.nsnnrtmey/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.mcaamhgue.nsnnrtmey/app_dex/classes.dex 4280 com.mcaamhgue.nsnnrtmey -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mcaamhgue.nsnnrtmey Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mcaamhgue.nsnnrtmey Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mcaamhgue.nsnnrtmey -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mcaamhgue.nsnnrtmey -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mcaamhgue.nsnnrtmey -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mcaamhgue.nsnnrtmey -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mcaamhgue.nsnnrtmey android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mcaamhgue.nsnnrtmey android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mcaamhgue.nsnnrtmey android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mcaamhgue.nsnnrtmey android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mcaamhgue.nsnnrtmey -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mcaamhgue.nsnnrtmey -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.mcaamhgue.nsnnrtmey -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mcaamhgue.nsnnrtmey -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mcaamhgue.nsnnrtmey -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mcaamhgue.nsnnrtmey
Processes
-
com.mcaamhgue.nsnnrtmey1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4280 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mcaamhgue.nsnnrtmey/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mcaamhgue.nsnnrtmey/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4314
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5770d00dfd76aa819f75fa55b30f0fdbb
SHA1cda6625bf7e4ac5368e6035bbe1286c69266c4bc
SHA2569a0dfcb6f33c5fa91c91cc66fc342db5b4c1c7d8da0248500927114ac09aa608
SHA5122abfb6b5deb3abcbcb619ab042d71d135460e7eb123822a2f0cd2f44c786338fb76653d907d18afdf87420fa9510ea5930dc0f5131b50a539cca0cf617b93638
-
Filesize
1.0MB
MD52e0bf59467ab7bae6df8cc299e9de4aa
SHA1f0f610c4b5e02fdeab2a3e6e2c95572daebbb6ab
SHA2566f7fd23b7cfb8f35e8a6fb11fb0bc953bbe7e2b933c7a3427cd133c76f6d7e0a
SHA512d51debfd0deab5c9eb32935f446d2ab0e05b09d7a426f058188c68ba89a7179cd4a3dfed26a5bea278866bf2f1b0ec61e923df1a5879007c553d266751c17dc5
-
Filesize
1.0MB
MD5fc32d987479c5043fe713bfc73c0b6a6
SHA19bce84125a7f816d3467081e3ce57b75d8a7e6bf
SHA256361af81c62a7a435f136e88d586175163d5e0590a7435fa2f8ed1694e8f866d9
SHA512a1c3662c2c4c542a4fdace66a6a8f08bc5ca9da9ed602709301cbd271011dbf25dc1241578d6f298b619d0f856529ab98b4b373f804f409dfa3a5528357d23a7
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e6e96b1e8440fbfc09bcef244ddf9b28
SHA13525256f6ec0c918ce7c083898ebda2e36ad4d51
SHA25617466d4acc22b40bdf0ff5acfef51672a3feed04c3796e73c9e678975e7e7ada
SHA51260da61ec79f9e635c2dbad3ef488cd5de68d85551c3fd16b738b8190b726d72603190e6cb83f2a682a72e400b0e25457fe7f3d74c8de7c8f62a4bb8a94663cc8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD52f1ca7eaddd0a274c6ca9a3141c94ed6
SHA1567312e0444bac2b65097290d05d43c0cd199a6d
SHA256a81221a486915d66d3eb6d55210b63f74451cf33749d675b092c00a5ae6859a2
SHA5120eaa25f91c1068bd02e7bebba911c9f9e40681d8ef67eca4da03fecd8d7d5a0aa4364371382509fd0563872fc79093225a86cdb913c8e7e9c441466347add247
-
Filesize
173KB
MD5aaa62cc46db0ba9775d323c65e48489d
SHA1c90f8ede9498f504c3071dfda71fa362de12b416
SHA256803d1ee68e30edf3f117ac3d077a5306da734d4128320e70ad2963d9fc07c621
SHA512e3914155d9dec2ae25a1b2d36aa921b07f17ec81a8cf1284e8dace3100891021b468c722b21a3a11e3f4943f28db0a76c52c224e642409023ea150db86478447
-
Filesize
16KB
MD52b56c30f4e9e921af55ec647734f3b8f
SHA1fceefb6468e62f64a867b8271ab051ff7165d7b8
SHA2567be6b83d359373c55291b4f8da9e7dc71d35503fa6a1a5a219de3aa542f7e565
SHA512e49f5f6a6a03a055b82f2f82e5832ddd5a8a518a305b2072776f4ad62d2f4209ff6c14ff44e254ce0dfffcab255bea66153cc1f475b6b32e8dcad1d125a43d7e
-
Filesize
2.9MB
MD5169a0dd82078a90b76ca5a014b19d514
SHA176d0c494b46583e2d0b7e8fea796c1db3ea6ddd4
SHA25661821d2441b656bc8bd2ea0ee8377a9674bcef5d9921917adb61a8bb6864f43e
SHA512e37d767b7d5d7082ba96a90f4c18fe8d4ff1567246a1d3c2a61d5fc267e963156736736df0d11a985ab3f3bbe802cc3f8d0c28e7468675e7ffa27d607dbe5a30