Analysis
-
max time kernel
171s -
max time network
190s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
10-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d.apk
-
Size
4.2MB
-
MD5
8aa230b892f1150bb4e173deef6260ff
-
SHA1
ecb3cf2a93e636b149797bdda7120c0e65535ef0
-
SHA256
a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d
-
SHA512
5255d16f4f186436b497bbbb05bdd8967d4824b1bcbd07e8ce1b1e4cbafb3ad7ad410f1e0a7a973a216cc4ca42c8b4c8287adc9d3dea8959c353e091752fee36
-
SSDEEP
98304:grmuGdyETMnUUxf+W6EDnOHL6zylQPra5qzbMfKSnKzdLyDqwS:grmXT+UEfI8n9ylxqzYf3nKztytS
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.eujazsdut.relpsbcqm/app_dex/classes.dex 4449 com.eujazsdut.relpsbcqm /data/user/0/com.eujazsdut.relpsbcqm/app_dex/classes.dex 4449 com.eujazsdut.relpsbcqm -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.eujazsdut.relpsbcqm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.eujazsdut.relpsbcqm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.eujazsdut.relpsbcqm -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.eujazsdut.relpsbcqm -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.eujazsdut.relpsbcqm -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.eujazsdut.relpsbcqm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.eujazsdut.relpsbcqm -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.eujazsdut.relpsbcqm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.eujazsdut.relpsbcqm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.eujazsdut.relpsbcqm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.eujazsdut.relpsbcqm android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.eujazsdut.relpsbcqm -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.eujazsdut.relpsbcqm -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.eujazsdut.relpsbcqm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.eujazsdut.relpsbcqm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.eujazsdut.relpsbcqm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.eujazsdut.relpsbcqm
Processes
-
com.eujazsdut.relpsbcqm1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4449
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5a3252c3c251b196b76f84852b71f7a96
SHA1737e2ab0ee6f37b6f316721fe42dd76596a24316
SHA256bf2a22961079445736b92970a266a0bb975c1277ecd4acb73fc6362075fc8a84
SHA5122b71355165b64acc701f4b0e9c5c2cfd61c5e6386ccaa39422feaa45838a65a53cdcbf62d2881fdddf79b9156ea1b0b9145ef905890cd768c34881ac7116ff95
-
Filesize
1.0MB
MD56a3e8d794059dc6135618dc1e349b24b
SHA170c62e7fae8c9beb008375eee4b2343f84f31c0a
SHA25610914c2481ea14767faad749b8c27e4ebe9a6cf7fc75f796ea1468e81e9b29de
SHA512504d2fa8bd8e942aa261fc9a4d4dbe2af57622dc9304f664c85415ff4adf972da6a6ec76bed91fbad443330945bcdce52a3ca2c321d43c09323fae3b37fc1682
-
Filesize
1.0MB
MD5c6616a73447fce11b1d9c98bc123fb21
SHA1e182aa041493b5078c225e72aaa6960aec65c003
SHA256af4da0c703d754964f5cb4400e293d710ce1acb99bfe528979d29565afcad9b5
SHA51292a473752b841e06a4e2159d82b556ee113192fe7e83f950de390a28c44b25ef3ee3fb0644dedf189b523474a66cceaa30fea7b226c0e7fd4bd7ba0af616d322
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD512a74d74234397ade17e85df3e7e8d51
SHA187ec5fb2ca5a7a320ed90ef0a56ea56e5d0f859b
SHA256d4f3e0e4aad461eb431801cd89434421778d86bfd56063cb8b07f69ca9a5dcce
SHA51227fa982e80e3a40d334656d2eb93e06537399597e1f6f1fcd61d6db6bfec7fc398b87772c8d90b6e89cdead0aeea2b8d0c2c884f9775b2628610a67e35e052c4
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD53d09e251b615f79f86a8ea5a39e28a1a
SHA1062903309e9095d6126b6de34484200e2a1bc722
SHA256df4e70ad92d6d6eb9cd2a73cd1256e295bc261207476c552d28f38fb0e7c6701
SHA5128168befc819243c296b2a36323c4909923a57f3af31b1afd7c2568bcc8512041a3a821bb4e5360436c9ac26e9265c8f4987589b169bca5f9950180698630ee2a
-
Filesize
108KB
MD58232cf5800aa27b75855e60183c957a6
SHA10c7a2b8e337edef54bc86f2b26032ac690eafc60
SHA256534800d5cd03ab621d44aa28594849094810403bdd56c627bdd0171ad7b5631b
SHA512ab669373ab5a0b669a57c3ae10193f916465cdb6eb80ded284c2cb86f54337373abc58ac1069b5b9f011ff36f763fd1ffb9b21a6e9c1ced442b46999e26fdd07
-
Filesize
173KB
MD5f35eeb48db439363fd4baa3241f91648
SHA1405e08fadea4a2e2f034453c3fc2afdaf40eb576
SHA256efbb8a24ddf23dac3b2bb8d617181e2b4144dd9506fa520ce2da010fb6db343b
SHA51236c89684e76e4cd3112337c842ab8319a60c6dc64f6f01f625fea7cbc4abbeb065338e7283065871b857630f8f18c458371500f1aabfde5eb6a4ac73841e4348