Analysis
-
max time kernel
178s -
max time network
195s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
06-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
9452b4fc2b46b99f309f620856a1235320a4fada2fe606edd470a0878a45d08e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
9452b4fc2b46b99f309f620856a1235320a4fada2fe606edd470a0878a45d08e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
9452b4fc2b46b99f309f620856a1235320a4fada2fe606edd470a0878a45d08e.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
9452b4fc2b46b99f309f620856a1235320a4fada2fe606edd470a0878a45d08e.apk
-
Size
4.2MB
-
MD5
8b4d1df35b23f264d4a0591e07b45d84
-
SHA1
bdeb3eba3781fe2b380e0f9900ae39013b617468
-
SHA256
9452b4fc2b46b99f309f620856a1235320a4fada2fe606edd470a0878a45d08e
-
SHA512
972d7e311cfabf60bdba12d4eed37e980a6f6de3c54229605241f74783b822543b1bacb4d3af75008c663bf3dd4ade10b433a5096ccb16dab7128bd18afd5d68
-
SSDEEP
98304:AXdn+NuhfSy262uagJGGII95IwfJdQ+PqOuWsm2JaV5sdOUwg/A:qd+NGfN2ya8GGII9v83RdOD
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.gtsbkixel.asbfpwyrn/app_dex/classes.dex 5064 com.gtsbkixel.asbfpwyrn /data/user/0/com.gtsbkixel.asbfpwyrn/app_dex/classes.dex 5064 com.gtsbkixel.asbfpwyrn -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.gtsbkixel.asbfpwyrn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.gtsbkixel.asbfpwyrn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.gtsbkixel.asbfpwyrn -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.gtsbkixel.asbfpwyrn -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.gtsbkixel.asbfpwyrn -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.gtsbkixel.asbfpwyrn -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.gtsbkixel.asbfpwyrn -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gtsbkixel.asbfpwyrn -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.gtsbkixel.asbfpwyrn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gtsbkixel.asbfpwyrn -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.gtsbkixel.asbfpwyrn -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.gtsbkixel.asbfpwyrn -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.gtsbkixel.asbfpwyrn -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.gtsbkixel.asbfpwyrn -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.gtsbkixel.asbfpwyrn
Processes
-
com.gtsbkixel.asbfpwyrn1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5064
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5636b4fa6ef9c46489bab2b9f69023339
SHA1ee86f9df91e041d6ec835c177e0b84a99fa062be
SHA2564934156e0a1315bb3084be7b404bf525275114f2fe031772e38f97aafe2183eb
SHA512670e0452335f5c0b917ff0e7ca05abb816d85ff08b4c22b009482e4ded0a553675d7e1bc4bcd4a05d27f71e4524156dbdb00d3289bb0d859923f6a32ef3aec5f
-
Filesize
1.0MB
MD55dc422b72f15749dca3efb7764123eea
SHA117f479e6cc1e7654dcc413e6e0a9970ab51e9a57
SHA2561eebef777ef76b879cc5fa533669ad3d2e81e707a141e70ebf6683cc0e2ad3f0
SHA512b8922bc6c723702d8c49050f72698b1a3d0c024058e1162bdd15f166f368559d06d1719a8e857a77ed6de70af584f021092fa27c3190302d5363660660df458a
-
Filesize
1.0MB
MD52c5ec24f892acd1761c3254749ac436c
SHA1deac1211ddf8baaf5ab741a893ce96cb0f832d86
SHA256589828535c72764b86d99b597d3a836cb7e025540164dffcad925c09725f9347
SHA5129aa60dc2e7bf2036c7b0fce58f8d736d4a85b47e771cfd8309639cdfe459f925e66af21d7207bce2fa7457d39cb7103f362e89ea82845e5735a23808b90afa93
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5838e4db4f9e0d39e974e8aeeb403be31
SHA194e45ca231d6ac32ddc02a135fb64b8723ea048c
SHA25609c84ee6144684b166a047f7b56f1d9a027d9605ee856f72359efe98b38a10f2
SHA51243d0a976456eb2b984f3d255b4fd732ea6783ce4ec4b221d62980cada4a1c68fce23e713cdb579e57a5f93814990f18a65c8ac8b3746165aa19a3fb2c537bcfe
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5a80a7ddb3825578a2ae31ed03bad5de1
SHA1df97dd174f22b8ae2dc8f8d68fa327caa902c075
SHA2567fc18dd62db775130cd30395ff579651ceb0c380c91a4932a9f018eddcd74564
SHA512593d5655b72b4e0dc52646f61cd7eb13acc51d8201d2e90c6a820b88364b7177718d52832129c013fe84e640dddea4c954e03973894a6ed27f3a1d434ef63cb3
-
Filesize
108KB
MD531c76edade22a9df13817612bf86747d
SHA144b215dd797ce3c0d4804923adbff1080deed0a1
SHA2563e8e1b691a92e0b425eb3da57cc62bc60b58036b935af1e4504c6caeafe44448
SHA512f50417865fc47ee88282943e86b03952902addfd08a946a7a1ac259e1736df750f5a80206c70046981784e8265827a0da3bfefa8fe13fe89f921b1c257c8fc85
-
Filesize
173KB
MD5464aa82f0fdf9b9bdf2c85012abd3dca
SHA1aedadb2f5308e5185738b5665cd72a55b1eff448
SHA256c59bb704502c9f39a16ca43815451b85e845a4d8d33a7b6a710238e3f1cd1db1
SHA512f912947b25ce2fbd963413b567aaaf34d0fbc98f86a90d0f7bf721dc555767c96ac98ec95b7a5ee9e7ad880a92b9fe5d73d8051963abe8eb6363e4817b78f713