Analysis
-
max time kernel
176s -
max time network
149s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
06-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
-
Size
4.2MB
-
MD5
2ad8f75c5c9cafc88b3329a5401e5b14
-
SHA1
65c855bd765831fa2d14cdb34a45d3cfd117453d
-
SHA256
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130
-
SHA512
47631fed6ef2717a9d52e16ba69bc6b1f47a521cfbf4a8edd3bcf79804753fa4b943e824aafcba92b0350df22ca177d8dc7ddef741e075190a607947c71130f8
-
SSDEEP
98304:lN9laXDlzbfAWKlGDTPSddKKJWznLLVpThLkz:lNXElzcWKl/zKKAzLLI
Malware Config
Extracted
hook
http://testos03tt03.xyz
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.uwzjghish.faboeiuynioc pid process /data/user/0/com.uwzjghish.faboeiuyn/app_dex/classes.dex 4991 com.uwzjghish.faboeiuyn /data/user/0/com.uwzjghish.faboeiuyn/app_dex/classes.dex 4991 com.uwzjghish.faboeiuyn -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.uwzjghish.faboeiuyn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.uwzjghish.faboeiuyn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.uwzjghish.faboeiuyn -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.uwzjghish.faboeiuyn -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.uwzjghish.faboeiuyn -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.uwzjghish.faboeiuyn -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.uwzjghish.faboeiuyn -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.uwzjghish.faboeiuynioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.uwzjghish.faboeiuyn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.uwzjghish.faboeiuyn -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.uwzjghish.faboeiuyn -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.uwzjghish.faboeiuyn -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework API call javax.crypto.Cipher.doFinal com.uwzjghish.faboeiuyn -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process File opened for read /proc/cpuinfo com.uwzjghish.faboeiuyn -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process File opened for read /proc/meminfo com.uwzjghish.faboeiuyn
Processes
-
com.uwzjghish.faboeiuyn1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4991
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD58d8fdde3fb9dd5368563b64be4e8c445
SHA16942fe537a9603e0d7b7fe9ce4012e779bbaf735
SHA256572230caf389c5ba1f8ff329671c73ce3fd02233d1054d223669d349b5b8b083
SHA5123770a62d98400b2d734c4b7bbb5447d00d869f8f55aa689a394e8d9b071ce6edc951bcbbbb04e29517a64f6f8d1894214f61342fe012cb2436ff7a9a07cbbf77
-
Filesize
985KB
MD5031284aea7032e3d3e756459192843d7
SHA1b478e9d423387bb7a2f549b7df2b89a7e46ba1f9
SHA25634f982344fe1b91609b1788e255bb0df7f0a552b5bedfa23bf847591333bbb7c
SHA512e2ebb9b0ec2d350598773f0fd2395d497acf97b35375f7d389dcbb72a06c81ab3f4fc11f0645495930a6528be6b52748963f273862260ecda56dfd194c894c8a
-
Filesize
986KB
MD56cf198c4ce367653b19f71698a91f9df
SHA15d5f194fb1b39f6df6658717259837ad81bf676d
SHA256c50ce39859685aaf09d9dfa98cf37acc794ac599d3118a5dc9f80f4873b70d9c
SHA5120069d546b3eff9228af2d8ddd00d778f822f6ffebd543994101770c363e0f1a68f19ead921b8b07bea05c92e006e64951c42a857b1f69b66bab37b96c642b997
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5923e2eee0923e0ce3aa40c4e0338f7b3
SHA150268010d51701acd14237e7cdaf1b45c70b59c9
SHA256a7464b92c797909c2bcae85497f9b6af1390592b3a8c09d79f1bc4ba9eedeba1
SHA5129062f49af20d52c8cddb5c1605b8bdf02f6eb5dd9a5e39596ea626fd831d8254d0203d78fb3039edd64f692cf43a4913ae962bf0835c01464149e8acb88ec2b1
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD56f2bacd22ea873de61f06289c3818737
SHA1abff08e010c76212c0513f3bb5d8db06e15ddb22
SHA25617691b6b9d360cde583c02651fd204a06fe38ed42db9e3c141103bcde183845a
SHA512757bd42c60055b77c6e3f4b6853cc319bdb7e2d330b8976c0c5a8f0370265394f71ef7c78432b7d4790d7833cde6449e50e6adfc50493f32476ec147dc49f873
-
Filesize
108KB
MD5b2424e3225a2ee4afacf02655b538ddf
SHA1ca994db55d9adc42481fb8e7c61cf9a56f30bd89
SHA25698399f833a82ebd02fbc1a72f4e3920cf3cfed911793b5f750d3bc2fd17598c9
SHA512e4531ef3302a243cbee8b29bbc10d88b8fac80528875ac6daeac300699fe090b4a01faa34355e91c72f58f6398bd3d24663209ea29a009bbe1baa0183bb6da33
-
Filesize
173KB
MD55086f50e57855b7c9ccc0692532ab9e6
SHA11251582b874b511f206eab56d65120bd90b9c2e0
SHA2569334c547738564ec7f029a86f11eb874d41a5a260b9f01bb7dad937ac5091886
SHA51249f0be2570eb8dc076bbc6fabf3bf710941c3497be96ce5904799a8dae5ff809a25e8cdaf53187ec71865bb796124397ca41eb1e23e773e4578a908dc8acc3f2