Analysis
-
max time kernel
170s -
max time network
191s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-08-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
-
Size
4.2MB
-
MD5
fd42d4308cf151e2c0db5cec62eaf3a9
-
SHA1
5ea25df3cd89004950d57bf3be0fd152650d2090
-
SHA256
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74
-
SHA512
f3916b3aca7bda2f701fd21d76665ab66f2d6e8b5337e387ec969dde52d5d4e38d726d56222aa2f1aab6c403285558f625f0886a5a5bbbf18ffb4a078944e181
-
SSDEEP
98304:Zv0vruQH77VbKRgczB+U3vsI8nJermp+A0O0HSh9L0TR:Zv0vvb7cRfIpf0O0q9LkR
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.oneiydald.ljvhyukgi/app_dex/classes.dex 4959 com.oneiydald.ljvhyukgi /data/user/0/com.oneiydald.ljvhyukgi/app_dex/classes.dex 4959 com.oneiydald.ljvhyukgi -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.oneiydald.ljvhyukgi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.oneiydald.ljvhyukgi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.oneiydald.ljvhyukgi -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.oneiydald.ljvhyukgi -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.oneiydald.ljvhyukgi -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.oneiydald.ljvhyukgi -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.oneiydald.ljvhyukgi -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.oneiydald.ljvhyukgi -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.oneiydald.ljvhyukgi -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.oneiydald.ljvhyukgi -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.oneiydald.ljvhyukgi -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.oneiydald.ljvhyukgi -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.oneiydald.ljvhyukgi -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.oneiydald.ljvhyukgi
Processes
-
com.oneiydald.ljvhyukgi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4959
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD58b86f1c6b7733d2ebdf6baf3835e7cfb
SHA11abdd3c1b5b897f0acf4416dc06d9ff45a264c5b
SHA25626dddf251427e91250c94ab73c321a4684615d3bbeaf4591fdc503f69dc1a50a
SHA512cff99c84b1ac49cb5bdc868960bc9194cfac48cc09c163c24ca70c31cd2e80cdf298ad2cc5f0f5bb1cfd647c28a6b988f62175080cf1f03acf970c041e7a7338
-
Filesize
1.0MB
MD59bd19e677abd41357566f3a94f2b7d9a
SHA1e469978a46d08db98182d217eea7220cda0c8fcb
SHA2561ba5b9b51eae9fe9df296f46c5d9ae3a831ebb7515662bbba12d1d802e2a9998
SHA512b7ac498abbcb0e6856453dd6baf4e8270bbc2270df4c619d3d14f43c2bc433471a6f1838623f50e44321ec4d0e4662daf42e3feb29302fd629dc7094e51e9c2e
-
Filesize
1.0MB
MD58d2ce108ff303c1ac8d9afda53076d59
SHA1152e12b78704e53435e727dd1e520c13c8e1f71d
SHA256331538a52011885c4f3c3284acc768213458f701de49a6bc8525a12f5ac6a6a6
SHA512fd8e3deb468158be5ebd1bd5b9202de9ce1edcddba57f160e00fb948ffde9e8115ec49372cf80fb9bae84edc7e484db4c0822205ad015383e3ae7671a6a58af6
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD589af7a884cf1423f09ad2051c6def73a
SHA1bc74411038054017851bdbbd379a2cfab9cf683e
SHA256667accbb6a18d3611d2efbc70dc4686474b9d1aa19e58741b18666df98ba978d
SHA512bd44e978c25210cc20d791bc8c4ca5eb821ec5961227c1db21ddc6cb947366781caf73f5af720fb15fad621f817e9722fa3561e623b0d94e2c0f45e75f3df2ae
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5087b7a1fc5516b121daf1d0385a09c49
SHA114759bd2a10598814fd3a894149e637b188de307
SHA25645a43ea3a964ffcf3c2456982c49988c2617d56490a629303078b70f1e1636d2
SHA5127f3ad09a50c4d522c57d0f1240628e6d5d2875960bf40b63337c9955a4542774b737671a8c166a549c3e6146f15bb1350eafcc693ca797b94f54b7a636f86e1b
-
Filesize
108KB
MD534cfeddd568a45e13a69b2ea7ba7c867
SHA1e5429b22eee1d8663509deb3806cc78388c3ba48
SHA2569bc4f4650faff9f2ac12d19148559855d13ec189621e5780aaca569891f17050
SHA5129aef88c6f461d97679ce664198490d2e6631964a1322bbf59f11b53edf834f725fb16bf2ad663f46fb80908c25a6fc863ccaf244181455abe5c4a3a56698a8a7
-
Filesize
173KB
MD5ebbd995cfb37e933481071d720f5eb39
SHA1127828715b385118a38e8d5170adc027eda6869d
SHA256296321777f012a110fbbb3b0819a0bb86a649de132f75b78efdb46e4d2996a1e
SHA5121e98c0de66b22ba7ed2b1323453f471515da411fea114216ec8f8b6e3dbb62e7d3d2dead1c8bb100ceaefc0e86de8f98b91e411c2d3b7ddd7fdc2a5eecc3d915