Analysis
-
max time kernel
179s -
max time network
134s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
06-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130.apk
-
Size
4.2MB
-
MD5
2ad8f75c5c9cafc88b3329a5401e5b14
-
SHA1
65c855bd765831fa2d14cdb34a45d3cfd117453d
-
SHA256
452fc26260246975eff7c5b372b27f935b9bb1907660d9504912ddc69f0cf130
-
SHA512
47631fed6ef2717a9d52e16ba69bc6b1f47a521cfbf4a8edd3bcf79804753fa4b943e824aafcba92b0350df22ca177d8dc7ddef741e075190a607947c71130f8
-
SSDEEP
98304:lN9laXDlzbfAWKlGDTPSddKKJWznLLVpThLkz:lNXElzcWKl/zKKAzLLI
Malware Config
Extracted
hook
http://testos03tt03.xyz
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.uwzjghish.faboeiuynioc pid process /data/user/0/com.uwzjghish.faboeiuyn/app_dex/classes.dex 4417 com.uwzjghish.faboeiuyn /data/user/0/com.uwzjghish.faboeiuyn/app_dex/classes.dex 4417 com.uwzjghish.faboeiuyn -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.uwzjghish.faboeiuyn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.uwzjghish.faboeiuyn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.uwzjghish.faboeiuyn -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.uwzjghish.faboeiuyn -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.uwzjghish.faboeiuyn -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.uwzjghish.faboeiuyn -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.uwzjghish.faboeiuyn -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.uwzjghish.faboeiuynioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.uwzjghish.faboeiuyn -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.uwzjghish.faboeiuyn -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.uwzjghish.faboeiuyn -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process Framework API call javax.crypto.Cipher.doFinal com.uwzjghish.faboeiuyn -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process File opened for read /proc/cpuinfo com.uwzjghish.faboeiuyn -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.uwzjghish.faboeiuyndescription ioc process File opened for read /proc/meminfo com.uwzjghish.faboeiuyn
Processes
-
com.uwzjghish.faboeiuyn1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4417
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD58d8fdde3fb9dd5368563b64be4e8c445
SHA16942fe537a9603e0d7b7fe9ce4012e779bbaf735
SHA256572230caf389c5ba1f8ff329671c73ce3fd02233d1054d223669d349b5b8b083
SHA5123770a62d98400b2d734c4b7bbb5447d00d869f8f55aa689a394e8d9b071ce6edc951bcbbbb04e29517a64f6f8d1894214f61342fe012cb2436ff7a9a07cbbf77
-
Filesize
985KB
MD5031284aea7032e3d3e756459192843d7
SHA1b478e9d423387bb7a2f549b7df2b89a7e46ba1f9
SHA25634f982344fe1b91609b1788e255bb0df7f0a552b5bedfa23bf847591333bbb7c
SHA512e2ebb9b0ec2d350598773f0fd2395d497acf97b35375f7d389dcbb72a06c81ab3f4fc11f0645495930a6528be6b52748963f273862260ecda56dfd194c894c8a
-
Filesize
986KB
MD56cf198c4ce367653b19f71698a91f9df
SHA15d5f194fb1b39f6df6658717259837ad81bf676d
SHA256c50ce39859685aaf09d9dfa98cf37acc794ac599d3118a5dc9f80f4873b70d9c
SHA5120069d546b3eff9228af2d8ddd00d778f822f6ffebd543994101770c363e0f1a68f19ead921b8b07bea05c92e006e64951c42a857b1f69b66bab37b96c642b997
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5775467e7ea00fb4c92813d5d360d65b9
SHA191cf11a14829403fb5534f212451da10ddf4e95f
SHA2567fe7d60aad3c7120309ee918010518aa4946983c332d08db4e5ecc8d35de2c30
SHA512805b3194f709042f41f6345c2ddd1a0208c027dfc5a7da3eaa885ba43b78f7d9f4304acfbf18c67f6d31e3e5d6f73ed75b93878f84bc38e5c181445a84370ab8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD567f42a014bc3ed8e9d97ecb934ca1c83
SHA1dec694edb3fde4edd1997972ba19824016d99b8f
SHA2565e7582e797c50b03287239d64d4b9ddf7c29691a88d9fe0b6a66ee557da0ce53
SHA512602c52381866fa26f2bebcb5b24af15f1cd0f261834f079147af890dada90c088445b2e6df0df485e82d04a3ad3b5fb78fe5b8c16a18c981e28a697a38890a04
-
Filesize
108KB
MD58ebc44572e8f89017a6ec97012c2caca
SHA196e30ec088153de77fcc82d1d45b01f836f1e218
SHA256f4133737db0447ba068a0a3077d958df128a21fce2191fa2dc963d38403846e6
SHA512b8cfbeb3c9140b654692ad150b80fc33a6e397479f45fbe80f3891e351426b2522f3cd3f2acbafacfe508371ec0d689afb01394925eb011a34b8a0d539a936f4
-
Filesize
173KB
MD548bbc7046f34ee8d9431cbc67cfaf886
SHA1c7e5037fe95e096bb776a84e1b183f35989e8e86
SHA256033cc21b26c4d751ac19ff9d8b6ee24720ba376de19d0740cb7541ef8818a8cf
SHA5124671b19f2b2a973741732631106e7f1df1f5f26768c9cc40cff0ac26ca76ff5bc57aaf4b069c8a5624c79577b35f1f0984a3b002c93ed3bd60730cbe19f37b47