Analysis
-
max time kernel
179s -
max time network
185s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
07/08/2024, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949.apk
-
Size
4.9MB
-
MD5
acabd40f1b648a85d436b66051e956ef
-
SHA1
946356509ab3ecf8a188f41a5341c173067765bc
-
SHA256
0f2d432a696f149181f7345b1662aa66c8afca70b41bc9c85b2d7c6634142949
-
SHA512
83028ab602c2a660a77e770a8d311690c6605b1694052d65ab49ac4d1264be29fd1aa48ac387b3c0ccad639ee10e3053f9bd54d8cc4307a0ff872d015850afca
-
SSDEEP
98304:5DLAThoeWVq6EiHQnNC0fDWuAHkPM2mrRH5XbxaUqtUQ08tKYNbLIemcFU:53IVWVzHQNjauE0M2gRH5XbKrtHS
Malware Config
Extracted
nexus
http://45.143.138.133
http://gecebizimhaberlerdeizle.co.vu/
http://haberasanbizdenozelgundem.co.vu/
Signatures
-
Nexus
Nexus is an Android banking trojan related to the SOVA banking trojan.
-
pid Process 4250 com.alert.castle 4250 com.alert.castle -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.product.model com.alert.castle -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.alert.castle/app_DynamicOptDex/uZdhso.json 4280 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.alert.castle/app_DynamicOptDex/uZdhso.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.alert.castle/app_DynamicOptDex/oat/x86/uZdhso.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.alert.castle/app_DynamicOptDex/uZdhso.json 4250 com.alert.castle -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.alert.castle Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.alert.castle -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts com.alert.castle -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.alert.castle -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.alert.castle -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.alert.castle -
Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.alert.castle -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.alert.castle -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.alert.castle -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.alert.castle -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.alert.castle -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.alert.castle -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.alert.castle -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.alert.castle -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.alert.castle
Processes
-
com.alert.castle1⤵
- Removes its main activity from the application launcher
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Reads the contacts stored on the device.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4250 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.alert.castle/app_DynamicOptDex/uZdhso.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.alert.castle/app_DynamicOptDex/oat/x86/uZdhso.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4280
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5bb37610bbb15f568f3350bea510e47f9
SHA11dcc4f3baca18dac76249718e2d3534590b08c4e
SHA256af383997dc9851b55627cf9a531c67e8a07a7a6e732393c0b28acb0cf6279792
SHA512b7e570663bfee676a7b654f0cf3bc540f77564f3fe51a5da496ca7502ad7d938e5420eca91c19fa105a5716c08223550d2ede34988cf345f8a86f0e08a8d629d
-
Filesize
2KB
MD58aabf865864451d5939e8e9a28f41f46
SHA13b54e4538387c0ee759d021696c22a93ea665cac
SHA2567e97b8b4b37591aa76ca07ebc859c60887f101aa04505fc8700ea2754354a646
SHA512627d762b6c53fad625f880bd7568905cf34e7d67f48c9a7008490c2cf07200e178abd408bf76537831985668d266104c1136597ea543e2ca3f2c1a07a9e626fb
-
Filesize
2KB
MD587dd0f7d7a9823704c4accf2d4cb25de
SHA18438aa06ab725854ef7305b5b5b8968d48ef7d89
SHA256efb9eba643678843c5f4d4d11bedb6befbe13cf33b07ff7f33d709e51822628b
SHA51267986ab8f1e53b8164c2e1c040899c06ff7f02adea2b4abef7a82a440404e5f5e420605cb303020151b767f83db788fa4c4dbcc873c544fb8cd52e5fa0c2f5cb
-
Filesize
2KB
MD577c511edffdd522821fa2d08c9002a5a
SHA121d84c0d9d8334202192c7d60a37d308e67022e8
SHA2569fb6dba994d0a7c06e7123619284b67ec21b2394d61183cfac5c59703eb32d16
SHA512f32f247f70ba645531e7caf7dce62b6f171d1141b6d94b3f7593deee165c15379f398355cc23899209a5380f952f345a417bef170ebc08bda6908a397ed71cbd
-
Filesize
2.2MB
MD5efa90868a21fc81acd2487e42b63ed58
SHA127c0d7361b8442938e05b5244a42c56ba0565aff
SHA256153f2a70151c465b6fa00babe61d55b6a3e25d22eb96c40194f06242feacff5f
SHA5124ef0f056c76fbecc12c88c4d21a99d0f2ef27cd9fdb1e47cd3257629db6ef81dc91033a27cb2550b85c06d44dae72ecff552e7e4a19ee0dd06577fb8cb5d0c4f
-
Filesize
2.2MB
MD5eb68d6d89a6b39127bc645fa320c79e8
SHA1fea1bc7be40e9b0c34a291dd36294f50fcf92b3e
SHA25645ad8acf5bf7b86c38fbeee3e7b2301f1eaa5fe397a572a4bf6309eedd746285
SHA512b0951befc046ba75c47dec9d1f37307cba9d8ef57bc3c578c84f95dccff968d2ff2b6198cdd139d8439ca3cd65b27419f051e8f140813811f628d00bed24540a
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5c2ed66630519540d5683394fa1635280
SHA130f6ada6b3fff2ef8588a70bd2958d68d59c4af3
SHA256ab93a67d170183f5df177868b0972088a444187de8d80322bc02409127569793
SHA51231d2516e8b16979152096ee16c40ecb21963f1262bc4ebcab419d687f89da67e473bf02d13149bec93bbb4d9bb0ee7d018d5a64814ec95703a266b68bde8fbe3
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5f9304c2bc403e206a94f42f9c7025574
SHA1d11e2beda68fdfde629b3886f58d66dcc8977dcf
SHA25617e0392ad544458d8b686b986cb5a5a2db8ba650856a9a614050daa22df087d0
SHA5121148816e4e15e232935c3b2803c87995a1b2370f3a0bd018eb651bbb42a7c74e44d4c0af12bc9f32848303d2e2e087b8500bf58194f7d17a9b7fc6b3c7d83b7c
-
Filesize
221KB
MD5fefe5c8e61f5f7c86841971dab1a3ed6
SHA16589a469216e7f9eff2da61c364f8b698d522364
SHA256a4736dd07250c24e6e968109bc99d429c49754c493c3cb940bafb49245c289a0
SHA512f4bee6b2a3f2f48d52a4a0f7c938b1f2a71de971f09d578d8392af1aa12edb218ab66ea2ee32b9e6d6c7cf3c704b267f8016a43ed93eb5e69448649a1e8e163b
-
Filesize
16KB
MD57e09c4b6d1908ad6e7aaa1710f4bb91d
SHA14aa3dcbc57846b17c3b5ee135e9a1335a25bf6e2
SHA256cad4946e22d68f64b9b4250d1696e642a231e89d036558a6f5f3c073761d5710
SHA512605234be3846deb7b6098ec9a6ba94e6d81e8e8d3408daa486593878c28c66bb9950a080205067c75d7bc17b62b3db00794b522c0f674ac9299ce03a584e4d90
-
Filesize
6.1MB
MD5add5b7471d87fb142d3603450a2baa98
SHA15afcd44f7c0175dc3d0f3a81be765b67dd2fc7c0
SHA256cd05290b3124ccd3400a9efcb2f2a609b74676d2476eff7ff63d91bc6322e792
SHA5121d3fb67e93052500671e084c8dcda1b06bbce63015faa86408f2ba85e517ad2f94c34cfdda4e211d7485bcb78c787bf769be8c0ed91141dfbb966125291343aa
-
Filesize
6.1MB
MD5802a753d1ffbc857c8b91fb91d8eb890
SHA164cf4cc4d7feab9004a275fd6a05cadf93917cf7
SHA256ba641a60a99e49f0e0870eaf0ea0d550171108981eec64ff2516b332e28ec839
SHA5125492e875c4cb9135a18d5f20e64359507133493c5bfc3e7dcaf281f750148538dc8b073ad435f314141dbf7c1e8cc5acb2950ad34d4f6865591215343fee2501