Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
164s -
max time network
192s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
08/08/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b.apk
-
Size
4.2MB
-
MD5
e9fc5161e535e2a57b6f9163c610c652
-
SHA1
7c3dae64d2e135145f7b475aa0deb89397fd9aeb
-
SHA256
1084ac1a82f4644b875a4bc97c1ec3d66288d0320010aed7064c8278c0ee808b
-
SHA512
172eed90ebde2b2bdabf706c7781d8fbf74682ee33364eac21c659b1aaf44f42c6fe97fc7ef0c3a6ad2b045c0880830fda41aad21d83b3ec4efc0029d51d3d38
-
SSDEEP
98304:a31r14snih/mCvSQJ5NLveh4md3VBnfAAfsm:a3OmYNLvc/F8Ssm
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ddjrpfmce.svrbehsmq/app_dex/classes.dex 4430 com.ddjrpfmce.svrbehsmq /data/user/0/com.ddjrpfmce.svrbehsmq/app_dex/classes.dex 4430 com.ddjrpfmce.svrbehsmq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ddjrpfmce.svrbehsmq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ddjrpfmce.svrbehsmq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ddjrpfmce.svrbehsmq -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ddjrpfmce.svrbehsmq -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ddjrpfmce.svrbehsmq -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ddjrpfmce.svrbehsmq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ddjrpfmce.svrbehsmq -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ddjrpfmce.svrbehsmq -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ddjrpfmce.svrbehsmq -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ddjrpfmce.svrbehsmq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ddjrpfmce.svrbehsmq -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ddjrpfmce.svrbehsmq -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ddjrpfmce.svrbehsmq
Processes
-
com.ddjrpfmce.svrbehsmq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4430
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5af36d278c06d49e27bed8460a25f13c0
SHA1223a41e2c892732d71db7e9f58cec5ffdaa4eeb0
SHA2560332cffc8487ff65583c59af4988a32c7b192c348445648ae0d425592f911b4c
SHA512ce89cd51f9b0bf47f8988d00528418adb2c4077b65a1e412877e6170388c73c68e0e1087f85af62945fc2ff7560e9bfe1aaf797e0954bf8caa07c7358c336fdb
-
Filesize
1.0MB
MD5c9aa34e7fda823ab1857bf6cae333ee1
SHA123e03b6cadd35e59a26097588d9fa8969de493da
SHA2569d6e0e31a3278813f0e8a7fe659ee7a9460843cd22967cd47a9d06c9827efdb3
SHA512692fec382bbe53569eab3f87ba8ebabd20c24c4c12167ddf3f04a34b4313b1614a31b02966d11f7e07880e391a5ab965bd2adef2abf631888b4dff3ef1699b2d
-
Filesize
1.0MB
MD5f797c5c6e4f24e50d89c6036581e2a2d
SHA15dca1380e400fa53d9e5b3761fa4e8e0dbfc5256
SHA25630eaaf4269b2121287c6450eb62eed5a1dbd8ac7d97a87807ca0290f4f394c63
SHA512e94e630060f858f49e16b91207db1338c6b48a006f8e2c1d4564ef3d19e9a8b11c90e8c08b98310ecc4c69f290690333f6e5118d9cfe6a0f016db4a0c161d1bb
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5f273acb43e9694fd932421dab8a30b78
SHA125f84a8d0a1fe1f7f1915ac0544e7259779a77aa
SHA256257366d408336c832e297de53037511eb7a0c51b633c2367923024466da3f0b6
SHA5125bbaa734b0b01f4ff4bdf38497ffb30066c478b5a488180448e1af4dd12942fade022f257e305194f64cdb39213ae12cfb75ce71ab8c50d47abd32415edfa378
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5390b637b175efd1e786f7a4545b81864
SHA198b73280434a84f48c95bceedf87f399febae719
SHA256ac8bbbdbfb96785238edf6fd7c4b0119aef61a2db6c74ebd652f39e905b6082e
SHA512e525a7dacf36603c4b56131fc84269bbd0da06d7935fc738b00b639448b9895f0e2d176844191e08f668872fbcc83c6309ad5abb0758ba041f5c86b5a2996ab5
-
Filesize
108KB
MD59a4a64c8595acb886e9bcfd3955032f9
SHA1f8fc6cdb1ab8a3e5f9b74a3daabce9408de57b05
SHA256c1cc042ea1b56aaca5f83f082a7a5978987d0a10992d05308f052e27177a037a
SHA5125e9858595d9fdb46ca6e55c2953662bd2251c52b22a919c7dcdd1ee9619fbe1fcb3fb5302b10cd6e7b39c50bdf2b3cc8a2b75d34dbe41b284c4f34fde7ebb44a
-
Filesize
173KB
MD5ca1684309bc9930c95f43082c8cef5f2
SHA18c616ad35df221ae6f840c6ef470b2ec9723e89b
SHA2565764474ddf47a2bad488182c7115b2cfb96034df091d5ba35aab4f156d330adb
SHA512a63f7533064e9d1b2e7214020df8079c1f99cb64f7a5f506b745d5c45018bc72e1404391c47ef3e58046117d92f2467d191fc8ec6e9e29a899e79c625a50b5ad