Analysis
-
max time kernel
170s -
max time network
189s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11-08-2024 22:13
Static task
static1
Behavioral task
behavioral1
Sample
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74.apk
-
Size
4.2MB
-
MD5
fd42d4308cf151e2c0db5cec62eaf3a9
-
SHA1
5ea25df3cd89004950d57bf3be0fd152650d2090
-
SHA256
a307e975e08ecea3f5ae03228a287e051208b1fb97470fc57d24981567becc74
-
SHA512
f3916b3aca7bda2f701fd21d76665ab66f2d6e8b5337e387ec969dde52d5d4e38d726d56222aa2f1aab6c403285558f625f0886a5a5bbbf18ffb4a078944e181
-
SSDEEP
98304:Zv0vruQH77VbKRgczB+U3vsI8nJermp+A0O0HSh9L0TR:Zv0vvb7cRfIpf0O0q9LkR
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.oneiydald.ljvhyukgiioc pid process /data/user/0/com.oneiydald.ljvhyukgi/app_dex/classes.dex 4491 com.oneiydald.ljvhyukgi /data/user/0/com.oneiydald.ljvhyukgi/app_dex/classes.dex 4491 com.oneiydald.ljvhyukgi -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.oneiydald.ljvhyukgi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.oneiydald.ljvhyukgi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.oneiydald.ljvhyukgi -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.oneiydald.ljvhyukgi -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.oneiydald.ljvhyukgi -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.oneiydald.ljvhyukgi -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.oneiydald.ljvhyukgi -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.oneiydald.ljvhyukgiioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.oneiydald.ljvhyukgi -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.oneiydald.ljvhyukgi -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.oneiydald.ljvhyukgi -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.oneiydald.ljvhyukgidescription ioc process Framework API call javax.crypto.Cipher.doFinal com.oneiydald.ljvhyukgi -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.oneiydald.ljvhyukgidescription ioc process File opened for read /proc/cpuinfo com.oneiydald.ljvhyukgi -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.oneiydald.ljvhyukgidescription ioc process File opened for read /proc/meminfo com.oneiydald.ljvhyukgi
Processes
-
com.oneiydald.ljvhyukgi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4491
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD58b86f1c6b7733d2ebdf6baf3835e7cfb
SHA11abdd3c1b5b897f0acf4416dc06d9ff45a264c5b
SHA25626dddf251427e91250c94ab73c321a4684615d3bbeaf4591fdc503f69dc1a50a
SHA512cff99c84b1ac49cb5bdc868960bc9194cfac48cc09c163c24ca70c31cd2e80cdf298ad2cc5f0f5bb1cfd647c28a6b988f62175080cf1f03acf970c041e7a7338
-
Filesize
1.0MB
MD59bd19e677abd41357566f3a94f2b7d9a
SHA1e469978a46d08db98182d217eea7220cda0c8fcb
SHA2561ba5b9b51eae9fe9df296f46c5d9ae3a831ebb7515662bbba12d1d802e2a9998
SHA512b7ac498abbcb0e6856453dd6baf4e8270bbc2270df4c619d3d14f43c2bc433471a6f1838623f50e44321ec4d0e4662daf42e3feb29302fd629dc7094e51e9c2e
-
Filesize
1.0MB
MD58d2ce108ff303c1ac8d9afda53076d59
SHA1152e12b78704e53435e727dd1e520c13c8e1f71d
SHA256331538a52011885c4f3c3284acc768213458f701de49a6bc8525a12f5ac6a6a6
SHA512fd8e3deb468158be5ebd1bd5b9202de9ce1edcddba57f160e00fb948ffde9e8115ec49372cf80fb9bae84edc7e484db4c0822205ad015383e3ae7671a6a58af6
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5c74aaa90fdc013a3ecf989d5eb90d9cf
SHA11df3c4c43ebdff49ce469abc77ef0e1661329875
SHA2565930cc6e74deb7f3c91afd7f3198e471d7777aee97505834359c9eea85b4d7e1
SHA512c76edb454955f55d18f83d452c985e99aae60cb326f3ae778b1a2fa569846f065989bb5075c02f97e72f1ff3193119825de5bac50a0be45af402f5e6783e9cd1
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5874a58549cdc2865fd167abcc1d357e3
SHA1310009af4b79f0b9f8031b7738afca343e1d2adf
SHA25612426ab9c3aecbb2b3f8a9749fa56a3578efbbba3660e9438dcc6c11d8fb8ea4
SHA512373655f16fc6927a618c183de55cd6a98ca860136623fb8cc8c907491e7a24add3bdf4e702487680fc9f96286615d3017ab509e42c9364455ebab012061c5956
-
Filesize
108KB
MD518638a66806182b74be4bc325a6b8f6c
SHA16eedcdb3defb20bce420aedc637d3751f27ac9c7
SHA256b421a4e04fc7b1ad2bb8e53637726af5f628372b430c831b7ddf174ed3f1c7b9
SHA51242b626c17bca51b797646657ccc9844ea2d271f355a148b2f4c2faacdb366d9faa8d39a822316487c0b4b7eb1008ff82251ca0074d216f81998384f07007199c
-
Filesize
173KB
MD5fc3c98ff6242b63a2880c6b658b14da0
SHA13bab1c34067e04176e76bbcc2a951fb4f7b1a49f
SHA2566fe94a33b262f41fba6b3efab22b1bae91cd3cf7af4082ae7d56516dd3a9d634
SHA5129d55d9ce20310526da3ce58743aacd6fb1ca9fbebd130b684ffaed49b140ee0524d8b3190ebd167797484fa53e2eef9be626089225cb0358b0620a4fc044f38b