Analysis
-
max time kernel
179s -
max time network
190s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11-08-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd.apk
-
Size
4.3MB
-
MD5
642bc64883f419e4da9aaec0518ddbe9
-
SHA1
ffdb3415b3ed61d72c0da68bf792c2fc76b383f3
-
SHA256
c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd
-
SHA512
a62e1bfb62ad3ec205c4ed487f3204b2193e8cba1e39d9fcf0f2d3434bc8d4bf4641bced81a7c51cb524ba55e6158da63a9b94d11b3cef20365f99a1b70fed05
-
SSDEEP
98304:u39MrSRWTOfpcU/lSLMFQSjpio7jKhpqR8N1twQ52irho/Ck:uGrElfphldFQSjpio7jKhpIS3wQwi1cJ
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tolgfawjd.udvhnorih/app_dex/classes.dex 4476 com.tolgfawjd.udvhnorih /data/user/0/com.tolgfawjd.udvhnorih/app_dex/classes.dex 4476 com.tolgfawjd.udvhnorih -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tolgfawjd.udvhnorih Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tolgfawjd.udvhnorih Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tolgfawjd.udvhnorih -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tolgfawjd.udvhnorih -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tolgfawjd.udvhnorih -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tolgfawjd.udvhnorih -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tolgfawjd.udvhnorih -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tolgfawjd.udvhnorih android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tolgfawjd.udvhnorih android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tolgfawjd.udvhnorih android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tolgfawjd.udvhnorih android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tolgfawjd.udvhnorih -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tolgfawjd.udvhnorih -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tolgfawjd.udvhnorih -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tolgfawjd.udvhnorih -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tolgfawjd.udvhnorih -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tolgfawjd.udvhnorih
Processes
-
com.tolgfawjd.udvhnorih1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4476
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5d7808eb3fb72e10b7452bed09f8819a9
SHA1a40ecee5ff82c8cf7fac18240ecd35e7479a63b6
SHA2565acf2a01f9bf9b77abea6d4660d2b82359ad7662ed8a52ca754255ca03ef84f3
SHA51226027aaef3b04779f887e6b4ffdba5561ae267ad318affe5c1850f44613e5ae39e84cc561c784200de639714c28bfb5690d1dd7d28795e43463883bd10f06e1b
-
Filesize
1.0MB
MD5ffececa77f79db9048f83ce325d9f62b
SHA1c42d2c369b5216f9664950aeeeef319a67afde92
SHA2561274d10aec34c00d1d7e667981e7e462a42f3b04b9af85bff4b742ba9f4dd453
SHA5127f999de898e77b33a0175bc68019f029c4c247409467723444cb3a5ec36b67c0088ded49a477b44b7396f28000dea3d63e986dfa0a23be20ac1c133c4dd3a433
-
Filesize
1.0MB
MD5347804d3d7aacb1170572eddad2af2dd
SHA10360fc59ea9d5467b0f44cc11f68287f1265a1db
SHA256372cb01ddb9131499e8d179bba1560eaa1e1109f50fbaaf7b281210262b599ec
SHA512fba6766515a22fbf564eda3406ddb52a08e87497f4cf1c42270897fdaf94624c458dcae55337f565f951e4d2c0bb0fa8ef4b03123fc8d9cc715dddff98c0bcd4
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD509527961695d46ebc919e265bde7e0de
SHA1f4d9d3a428caa13fed1aa9bd8a96d9b639b7073b
SHA2569f0cbb99ee92486288f6e1ae2939e2bbb5034d3f267e9dee85a25c0cc5e6cead
SHA512b25bd71adb574c9124c4b838186e765ac97c63b2946834aa6d57380161f720f941c00770c4a1f99c5882c093f1bf305ba58b06cd2cef2446692870d97685396e
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5512540dfdf7feec4d4e3ddbc4804e36f
SHA177bc077abecab226530d3118b8357d1916f463d6
SHA256e38ed1c3b0be95c1bf421fbe7a70ec5994d69d2f318daba0a0a63434cbd73b0f
SHA5126b69dce0d0f920ac081d98c1f12c2f72b12f99e9affb4b30f06fecd93b49bec6c64f8c01b3f296189148b430b792b194394c901cc80963973d41a238f97253fb
-
Filesize
108KB
MD5657626a6a8aa14f2208a570365c2dc99
SHA12d9e8d8f2fd5fdf6c5c3b38114625c00f78ae213
SHA256c134374fa37360e47f7e9e6dd00cf9dd27a07c3fb05ef962fbb0401b0a593a36
SHA512088925f4b7d52c6609680ddc4a3d2c955ac4cd2fbcea645e405412daefa84484e72d68eb4321d2f85731a6434fa8df573ecf62ee30eba18766233d966a85bc63
-
Filesize
173KB
MD5435c0e25f1cead682ae8926b660f6f02
SHA1621a7b52967464b8c1483a2951afc16918e654c7
SHA2566510cacd89be7c9ea72f289758858f6eb1a4a79350e70835201cc404a7acd6ed
SHA51244609b7caafdf5173d333f8e8d4db9f17d700e48b5893a1594bbd95b88069647e1c438ae42a00b85a630e8c506aab3fc98807bba6044927b96171c64d8ece55f