Analysis
-
max time kernel
178s -
max time network
190s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
151a3015d28b6900314d26bfab29c842e79f3ae1a7dc6f06263dbaeeb8f02624.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
151a3015d28b6900314d26bfab29c842e79f3ae1a7dc6f06263dbaeeb8f02624.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
151a3015d28b6900314d26bfab29c842e79f3ae1a7dc6f06263dbaeeb8f02624.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
151a3015d28b6900314d26bfab29c842e79f3ae1a7dc6f06263dbaeeb8f02624.apk
-
Size
4.3MB
-
MD5
232c2bf5d546fc82e83fa6b857b8d520
-
SHA1
b203d301a94b25c0f9e19a37f0608f393b6f7b2f
-
SHA256
151a3015d28b6900314d26bfab29c842e79f3ae1a7dc6f06263dbaeeb8f02624
-
SHA512
17aa5809ffde17e2ecbf147cb15d0120e282c17a091a30f88664814221f033b6e25d250e95419d710cddd339f114b98b83b8cf20418702fc5997fdf724827949
-
SSDEEP
98304:BmF6IFY+48VKjMNEyEujutC37WSKS2+Uh/WoblnR/CkPxCT:B8T2+ppE07Lh2JWiCB
Malware Config
Extracted
hook
http://193.3.19.40
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.aivstnewt.ieqqgxfhq/app_dex/classes.dex 4285 com.aivstnewt.ieqqgxfhq /data/user/0/com.aivstnewt.ieqqgxfhq/app_dex/classes.dex 4314 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.aivstnewt.ieqqgxfhq/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.aivstnewt.ieqqgxfhq/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.aivstnewt.ieqqgxfhq/app_dex/classes.dex 4285 com.aivstnewt.ieqqgxfhq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.aivstnewt.ieqqgxfhq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.aivstnewt.ieqqgxfhq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.aivstnewt.ieqqgxfhq -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.aivstnewt.ieqqgxfhq -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.aivstnewt.ieqqgxfhq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.aivstnewt.ieqqgxfhq -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aivstnewt.ieqqgxfhq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aivstnewt.ieqqgxfhq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aivstnewt.ieqqgxfhq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aivstnewt.ieqqgxfhq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.aivstnewt.ieqqgxfhq -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.aivstnewt.ieqqgxfhq -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.aivstnewt.ieqqgxfhq -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.aivstnewt.ieqqgxfhq -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.aivstnewt.ieqqgxfhq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.aivstnewt.ieqqgxfhq
Processes
-
com.aivstnewt.ieqqgxfhq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4285 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.aivstnewt.ieqqgxfhq/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.aivstnewt.ieqqgxfhq/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4314
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5a5bd629d44821ad56adb8acd9e57a78c
SHA10de29ab0d82b48e0a860d63c758d8a1b62533d11
SHA25689dec092b0d3c7dd8b68b806d86a9f16c2f317f511e4ec6675dd0ec2f814f5bb
SHA51207c9209c3176c369db314424fe77e7c0910c10065653291ebf7452f921e834a37aa913f25b6b09d08210582ef25aecb17889014b46965890af5e82f96d269881
-
Filesize
1.0MB
MD51b014301bad555258e4fddb4f7f6c9db
SHA1554dea5f4405f2f191e74461f4ace81c25f49169
SHA2563b9387dbc9fe22f9095a8d922ce3cc8382a28638047cf47dcba9dc0d2d3b5c35
SHA5128b9264eaa00989332118897d317395edf3d9e044ddc851758421acdd19f837a9844cb587dc19dbe32d3948035df86d69c5b684a2c8e0fa6f6bdb2d2a2326b1f8
-
Filesize
1.0MB
MD577be669f53a757288b8bab52664e7cfe
SHA1c687a656e310cc184a2d94d8416709ac199ff44f
SHA256f7f552bca0f6af5c03adebdc58830adab401dad4a52a3acbae94c5d903be307f
SHA5123e111701420c9c73ff0555e7d000c8b7d7534783f5ff29d67dd13b6a150c7e21484606412bd69fa4b225841dbbca3526027cd83cfc4439a462db26b0f3bbfa06
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a7cb75222bdc7e6af682a7cf3c6d09c2
SHA1d8b33531c2bb9e2f7cfe96aa30b88aadb3d72395
SHA2561b87cb46ffd0de3eb469c70da427dcbfe09b8e6692da41770b33f08e743189da
SHA512c176897640f8efc6cbcc7805140c7710b971456570e43df676218f7c06e9c136d045f9f19d740aa274e36d3dbc6dc9bf248e33a2971be7c5d8d26d0fcba14ca3
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD56f573e4c1bab17c67e92e615d2ccab4b
SHA1a8f35321f1251806fe8cce8b9c360e3738e91eb8
SHA256df6a09a9f63ca61510815aa221ce9eedd62a40ce11c549fc1f1a55264d326f24
SHA51298317ef8d330be222a4a0dc39a7f500c50524cc7b5ee23b7dd36ea9882432aec300cfaead4a2f9523f549df482be43a98d4c50eceb4629d0c1f7dcfad9d7ecfc
-
Filesize
173KB
MD54afab39314304aabe4d69cee2515aff2
SHA15a017c88d8422b47d7545d3176d35eacb40da832
SHA256d2a55136584ba6360c090f885cbd827b450164c6a4ba91ea1705a92b774f9111
SHA51241b4d4e1422bb26da476ca0b5627b047958e595089e7f3e9cf3d23c8d4707c780e30aaa08061a07ac69838ed10a4a3c6d0414f989bc5c6036cfabae751f113c1
-
Filesize
16KB
MD589b699f6f6b6c0467a7ac076f7e01560
SHA109d1cf04d035514feff364b84b56918d525d493a
SHA2566d65050c88f95136479f11d7a5fbb58bd0663933e30f8a0f1343581bb5a42404
SHA512be52727c4c359c50e142752d3412be3ab6202c2c2cd66a250895e153a1beef80a876ed266a2a60fc65a5d3f06f6d4782481e9b0c835b5d4504425b5c92628b85
-
Filesize
2.9MB
MD5626b5e433117fd5ce5fc70917c35f38d
SHA1b1aa28ccafb31205d4311e5526651fc3910ed83d
SHA256169c8508728a070f1fe4f5fd637f01578657110bd1bf8dba4f70dae9a9de531c
SHA512545b798e77fa632db6c66928517756d957f89822dadc8df8c1ab1e0fe5b290ec38cc180caa25e9fdfb7a6e2f18908724ac4375453853212fd84ac49f7642f451