Analysis
-
max time kernel
179s -
max time network
186s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
07-08-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
c285378211e69f0c60c781125246f92357243d1f2832c03234255dc2a90a9674.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c285378211e69f0c60c781125246f92357243d1f2832c03234255dc2a90a9674.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c285378211e69f0c60c781125246f92357243d1f2832c03234255dc2a90a9674.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c285378211e69f0c60c781125246f92357243d1f2832c03234255dc2a90a9674.apk
-
Size
4.2MB
-
MD5
769bb3dc0e0193adba7d0133e877503e
-
SHA1
88f8774ffb21c8a1eaa43c1177135884ef05f480
-
SHA256
c285378211e69f0c60c781125246f92357243d1f2832c03234255dc2a90a9674
-
SHA512
ef011077f49da14eddbef99089af91caf81dd5302c1ae54c820ae87726b8df50dece6bbadac2d053f09ba3f8b918955669550d6ce407a105d800a639e4887513
-
SSDEEP
98304:mI/Jtgrndt42QTzEndzkX+NW4/e5mwI04KDKk93n:mI/JbzEdzp4Ae5nFDKuX
Malware Config
Extracted
hook
http://85.28.47.32
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tfzqlvjkh.awqzhedcoioc pid process /data/user/0/com.tfzqlvjkh.awqzhedco/app_app_dex/reeifxl.mij 4477 com.tfzqlvjkh.awqzhedco /data/user/0/com.tfzqlvjkh.awqzhedco/app_app_dex/reeifxl.mij 4477 com.tfzqlvjkh.awqzhedco -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tfzqlvjkh.awqzhedco Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tfzqlvjkh.awqzhedco Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tfzqlvjkh.awqzhedco -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tfzqlvjkh.awqzhedco -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tfzqlvjkh.awqzhedco -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.tfzqlvjkh.awqzhedco -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.tfzqlvjkh.awqzhedco -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.tfzqlvjkh.awqzhedcoioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tfzqlvjkh.awqzhedco android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tfzqlvjkh.awqzhedco android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tfzqlvjkh.awqzhedco android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tfzqlvjkh.awqzhedco android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tfzqlvjkh.awqzhedco -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tfzqlvjkh.awqzhedco -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.tfzqlvjkh.awqzhedco -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process Framework API call javax.crypto.Cipher.doFinal com.tfzqlvjkh.awqzhedco -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process File opened for read /proc/cpuinfo com.tfzqlvjkh.awqzhedco -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.tfzqlvjkh.awqzhedcodescription ioc process File opened for read /proc/meminfo com.tfzqlvjkh.awqzhedco
Processes
-
com.tfzqlvjkh.awqzhedco1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4477
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD50b63ef48dcecdddc31ecbb43c0963e4e
SHA11b52828068bf5db80fdf53228005632398644504
SHA256c08a049540a35306b4108b78201eb77b1b47f0c51f7bbb602365f6827dbe2538
SHA51282ba3df2c47f0205a3c1f6910cfe669a283b036d5a003518c6a98c873ded230cda188905b6be47638548d71108eb0132088c8d9c46a15020c8b6d052aac0ab9f
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD54bda2e2b21f40d9ee3e6c03b3e067a6d
SHA17aae98464bb3dd1c35a04f98041574e06837c4ff
SHA256b424af10838af9a7a9e3bd074590f57554d73f1b6fa179f940eff91a770fb8e2
SHA512ffbdf91a5205e425a8ebd36bd795aeb21d16cbeb1a0497b63ff7f08dab33c91a7d8de45e6a95af85d0e4719c686a04e0d8f504e517f007f815b523b618943c59
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD55fc40f045b8b3142a43beaf3bf44fb0c
SHA125da83a0e81fc4327ad33f11e48ba0a6683766c2
SHA2561eae34865ebccff9d153646db7c7e7eb84b3b1fa8d308e939ebbd5a146e9fdc8
SHA512269fbb8b7cf502f179175de657d77a8c329ef74573955a89903319d0de4e56dadd2aeb5bf123394ee0966cb1d0c1be4edcac46b2a41ac826f6ef12745a36c43a
-
Filesize
108KB
MD56538efa4057f8eeed83a983ee201cc45
SHA111292dc3bb1f3fc533b9022c753064ddf10a3ffc
SHA256a671fde04f26ed9fa0bbb9f4908e9f7bcae76790078b8cb3bb357b0e5f3c7bb9
SHA512655eb4426f0b7970abead0d06880acd231b21bbaa0882b8d1ba904ec1545e62e3b6088443127b8dd10260d37f38e4c66c59b7d044522aa844bafc4bbf7f655bc
-
Filesize
173KB
MD53fe756a2d6361d0b8375a93a929eff31
SHA1495f342b6977d7d5734b714b4f490336f96731e0
SHA256e7b6b04c4b30524d58e528491e2d7e25ce1bc24b48ac3095f07a9a73e3ba703d
SHA512f3151115c57112e773956f325ac3d540ea54a35704c0dbb77120b7658242c01b790f3c0cc5b602f9872e73e7fb427f898a4f92b142f4c654a731f762ec13c0a7