Analysis
-
max time kernel
18s -
max time network
193s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
08-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
-
Size
4.2MB
-
MD5
e9fc5161e535e2a57b6f9163c610c652
-
SHA1
7c3dae64d2e135145f7b475aa0deb89397fd9aeb
-
SHA256
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b
-
SHA512
172eed90ebde2b2bdabf706c7781d8fbf74682ee33364eac21c659b1aaf44f42c6fe97fc7ef0c3a6ad2b045c0880830fda41aad21d83b3ec4efc0029d51d3d38
-
SSDEEP
98304:a31r14snih/mCvSQJ5NLveh4md3VBnfAAfsm:a3OmYNLvc/F8Ssm
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ddjrpfmce.svrbehsmqioc pid process /data/user/0/com.ddjrpfmce.svrbehsmq/app_dex/classes.dex 5156 com.ddjrpfmce.svrbehsmq /data/user/0/com.ddjrpfmce.svrbehsmq/app_dex/classes.dex 5156 com.ddjrpfmce.svrbehsmq -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ddjrpfmce.svrbehsmqdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ddjrpfmce.svrbehsmq -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.ddjrpfmce.svrbehsmqdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ddjrpfmce.svrbehsmq -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ddjrpfmce.svrbehsmqdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ddjrpfmce.svrbehsmq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ddjrpfmce.svrbehsmqdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ddjrpfmce.svrbehsmq -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ddjrpfmce.svrbehsmqioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.ddjrpfmce.svrbehsmqdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.ddjrpfmce.svrbehsmq -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.ddjrpfmce.svrbehsmqdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.ddjrpfmce.svrbehsmq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.ddjrpfmce.svrbehsmqdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.ddjrpfmce.svrbehsmq
Processes
-
com.ddjrpfmce.svrbehsmq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:5156
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5af36d278c06d49e27bed8460a25f13c0
SHA1223a41e2c892732d71db7e9f58cec5ffdaa4eeb0
SHA2560332cffc8487ff65583c59af4988a32c7b192c348445648ae0d425592f911b4c
SHA512ce89cd51f9b0bf47f8988d00528418adb2c4077b65a1e412877e6170388c73c68e0e1087f85af62945fc2ff7560e9bfe1aaf797e0954bf8caa07c7358c336fdb
-
Filesize
1.0MB
MD5c9aa34e7fda823ab1857bf6cae333ee1
SHA123e03b6cadd35e59a26097588d9fa8969de493da
SHA2569d6e0e31a3278813f0e8a7fe659ee7a9460843cd22967cd47a9d06c9827efdb3
SHA512692fec382bbe53569eab3f87ba8ebabd20c24c4c12167ddf3f04a34b4313b1614a31b02966d11f7e07880e391a5ab965bd2adef2abf631888b4dff3ef1699b2d
-
Filesize
1.0MB
MD5f797c5c6e4f24e50d89c6036581e2a2d
SHA15dca1380e400fa53d9e5b3761fa4e8e0dbfc5256
SHA25630eaaf4269b2121287c6450eb62eed5a1dbd8ac7d97a87807ca0290f4f394c63
SHA512e94e630060f858f49e16b91207db1338c6b48a006f8e2c1d4564ef3d19e9a8b11c90e8c08b98310ecc4c69f290690333f6e5118d9cfe6a0f016db4a0c161d1bb
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD581ed4df01ca51b4e3dd5f22f073b97ce
SHA1d3f36840096732ea24a4d446e8f10e1685c7dd86
SHA256babbfce7b935ea9bb5da3fdd69322bb2c07a90a4aa3c58c0caaa33815a59546c
SHA512fcd29e34b3a83bd3ca91460e2479ff24ace9e926c3d02cc7dfb1849f2f086201275c866ab34ef2c99755db902e7f49957af41ab9425802c17a7780bc04c95319
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5c3368038c667d72adef03ea225222124
SHA1ad3c9530dca6e5cdb5935f60ebeae60c47218299
SHA256a3af122baa4e6f459d9564e2327d40067e6f8d5392e21e5da874026373d08dc7
SHA51259fd258511bf7aaf017a017cdb4d168d7ae72ecf6ac5b90d7cce0dee75da9483a30165692fd19684349c1bf007198829dbb816b63a50d01c1dde2568bf284684
-
Filesize
108KB
MD590222ec60a0093cc5772ef6b24616d70
SHA1fab5f57cb6df02fd6e262fd062fb8ed939244a9f
SHA256cb34770e88d64ad282a136dbeea5ece026a8adad814e035862cba37adb1eaed3
SHA51269fada8a1aea514927d10679a5b3d4dcd75fffda4b6e37c538f1d85cd3efcac5163a7474b8b23f99df6e8af3f17041f61553efe72a13d8045003908a58f92b65
-
Filesize
173KB
MD5a9fccc994ff4fa6510165418ac845fed
SHA1a8fd0271081f7360736e238168ba9780e434c858
SHA25686fd9beff2a739c5645646e0f2cef97d9a1a42a3b41ffdb6f41c05cb2ae372f1
SHA512067bd0be16dca35a73833444ffa0d9b9fb83fa86337b7e02af35ec4f7755fb0b70248879c3eae1c5751fe4d010bc45f17523ffbd58dffb8f5f06e368e03889b7