Analysis
-
max time kernel
44s -
max time network
187s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
12-08-2024 22:22
Behavioral task
behavioral1
Sample
bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.apk
-
Size
1.2MB
-
MD5
dc5b59b765c50454c3668bc2608ffe52
-
SHA1
5945bcc40840cfad63b1b347c8ed87c81ead4e74
-
SHA256
bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e
-
SHA512
ea2e30b743972f5fb167e8b5d75d28d305871f532362129b5ba58c5f949173821502a186637844aa908c9ada428791d2cdee968a64956c9ff4e9ed4c74665792
-
SSDEEP
24576:gEs5wSn188ECTBwY16MPIrunOK3KmEFyErgDR4fHklENPl:HK9iCdwY4cp3lEkErgV6CGPl
Malware Config
Extracted
hook
http://wispy-pine-99659.pktriot.net:22284
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.hevumejiyafelo.poyadane Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.hevumejiyafelo.poyadane Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.hevumejiyafelo.poyadane -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.hevumejiyafelo.poyadane -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.hevumejiyafelo.poyadane -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.hevumejiyafelo.poyadane -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.hevumejiyafelo.poyadane -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.hevumejiyafelo.poyadane -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.hevumejiyafelo.poyadane -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.hevumejiyafelo.poyadane -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.hevumejiyafelo.poyadane -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.hevumejiyafelo.poyadane -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.hevumejiyafelo.poyadane
Processes
-
com.hevumejiyafelo.poyadane1⤵
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4253
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5975272999480a27b9985ec65d653fedb
SHA1a52ca53a99283aac65d08d085d50f561b33ba6ca
SHA25601585c2411e14ecc14787a9a84956c3dbde6dbecd17e5fcb7b1c6dd8e533bf18
SHA5127dc2a407a34050ccc47c3cd838796a2c03797856dae044edcc4e6b1d16f33e035c30526b2362dd98908c6054b63a7296a9b1b5efd50b74afef2eef1869fc3d68
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5c9b4cdcb81d8ce6b33a4e15e196dd97f
SHA105e61a740ee2934290fa87a1209ac045ef1d882f
SHA25680b73d30dc2a6d4ddbe92f7ad8f55006f541f71e6210a10c6a727bd0943f6628
SHA512051d661430fb35797a9699e48f67782c6f084ae6b1cb9168b2f6dc01796a03c05635ec26c080b3d169dd7ae2f631e09399fd2555e51370209e0933d639b82abf
-
Filesize
108KB
MD5afcdd437c96c065e1059217b91a3020e
SHA1a64fd5c40185b3e503be03b3e54e80d1651a8872
SHA256ec5081579f3dc80042f486060513bf6e28d3f40ff2a0290f9dd13388fd4bb65d
SHA5125fd31d4f77faa3abe5dde847ffa59f86d7ab71528ee7791f9483e396a1c1e6b96c4dce49cf1e5b97ed2e45e33f2aaf0ab62a39688ec721d64f2fe4c52c043152
-
Filesize
173KB
MD570db998f232ce18ac035b4b660cc6d12
SHA1f494dc870dec0ae79747dcdb893e810c2308f3fd
SHA256c353707f5bc835031422d40bb5c251e3b799676d9ad02b7dd6868ef7be890bb8
SHA512ecf8c1c5884fe2cb3f099c479566875d58e39b86b84df3df5dfde7c4fbff65a4546460a16c1631a71c3d1155059039de83a0a0f5803decd044815e3418e85fd5