Analysis
-
max time kernel
168s -
max time network
185s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
13-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
50b13a2bfd064894b7b3414ab1a4a0b21b0b536d270bbf3549bba67fe40ef355.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
50b13a2bfd064894b7b3414ab1a4a0b21b0b536d270bbf3549bba67fe40ef355.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
50b13a2bfd064894b7b3414ab1a4a0b21b0b536d270bbf3549bba67fe40ef355.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
50b13a2bfd064894b7b3414ab1a4a0b21b0b536d270bbf3549bba67fe40ef355.apk
-
Size
4.3MB
-
MD5
1d4a89cc8bf454e5443be6cd36e67325
-
SHA1
bcf9f58d4a4af7895f57e1b928aec7c757260294
-
SHA256
50b13a2bfd064894b7b3414ab1a4a0b21b0b536d270bbf3549bba67fe40ef355
-
SHA512
894bb7496e76f7678467274ac9257e76c0d816c2df4bcc94b07641f2cf323f0209831df3acc314f5d7f9c6dcd5a3ad36589d57dedd29110a15061f4399cb4fa9
-
SSDEEP
98304:JuaF5nWll4HGsxu4OKY8K+AbVJS/5IkDFQAeWNF9lwNwI7QlsNZ:QaaloPx2+AV0IkCAv9cB7Q6P
Malware Config
Extracted
hook
http://134.255.180.156
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.qudxvqoua.zshvvmukzioc pid process /data/user/0/com.qudxvqoua.zshvvmukz/app_dex/classes.dex 4519 com.qudxvqoua.zshvvmukz /data/user/0/com.qudxvqoua.zshvvmukz/app_dex/classes.dex 4519 com.qudxvqoua.zshvvmukz -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.qudxvqoua.zshvvmukz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.qudxvqoua.zshvvmukz Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.qudxvqoua.zshvvmukz -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.qudxvqoua.zshvvmukz -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.qudxvqoua.zshvvmukz -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.qudxvqoua.zshvvmukz -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.qudxvqoua.zshvvmukz -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.qudxvqoua.zshvvmukzioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qudxvqoua.zshvvmukz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qudxvqoua.zshvvmukz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qudxvqoua.zshvvmukz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qudxvqoua.zshvvmukz android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qudxvqoua.zshvvmukz -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.qudxvqoua.zshvvmukz -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.qudxvqoua.zshvvmukz -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.qudxvqoua.zshvvmukz -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process File opened for read /proc/cpuinfo com.qudxvqoua.zshvvmukz -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.qudxvqoua.zshvvmukzdescription ioc process File opened for read /proc/meminfo com.qudxvqoua.zshvvmukz
Processes
-
com.qudxvqoua.zshvvmukz1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4519
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5cab0b80bcb70f91d4972a5413b37ca16
SHA183260b8a40958ed23432b5fa6afd9091be603b94
SHA256687cf183b791404fbef4dfae692a19dcab0ee781e5afa3abd12a6bf0d3d5f17f
SHA512a4ee0dc2cbd367f8697f46f6a8b507db91e192fe6e91e314b9863b9736ba0318c0d2745539f142d85386fdc9e4a1b3c0f33102a7ec87704f3ce3ee6a65a65e1c
-
Filesize
1.0MB
MD5e51cb0674ceda6d705b5a54caca5618d
SHA13cd04b784886c87c43e1aa86d284bf1ad14b64b1
SHA256d6695860fab877a1d6be1c4305fb84e236916b95441e05ae53ffa82985ec4f3f
SHA51206b252bdf3f025c2e2b9c242d744e8b2b7c1b8937c505380f64639f2718b4a32d77d6553757e82d20d3369e3071e757f770edbac511cc8bf2c73a6100e437af2
-
Filesize
1.0MB
MD55236fdd55df448c7a158f395d9a3e568
SHA190a95da4487718b4cd56a0a59b7e7b5f78c47e40
SHA256e9276c366d24e4c7a79bcd0d5fcd81930a1ad370ced2dae31357b10b9635ca93
SHA512b1d8141198c21b7f2dc51f5fa22560c5b28195db6423fa111b086a4ecb6a0fb19cfc55ad81e7915d60b8ca11886119518800c8bf1ae692167aa8aa3a1604f796
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5a7a89e9b2f9e53f457dce5837b91961a
SHA148cc168fa3af8a7aa4426c7772fb05d43fb82c76
SHA2562d9bd3ee256d3769e8d42e25636b541f26739425d20181d292482bb328516f76
SHA512cc6b653c5cb9a2d11da2bc218aa2fd69922a0a3d75acc10ab354217174abf87db2009f3b3df945b9a2b9fd35e7b48cb6103a97365523d3866003065de501bb00
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5c56b787c6d9d2228c7de7936155dc752
SHA192a92e577eb49d5db25a93e1908cf83b61f844d4
SHA256edb122267a4f6c5864ce6314f40892b438c89cdf55a7c4ec8fc3f33c507b6a4a
SHA512a7893f407c877c4c6a12f24bf2e900c291494a453380a4d447acbca37a858c2402e4288702ac47e664ed1fe9c724be4652c3920e19bd353833c579e192ec1b9c
-
Filesize
108KB
MD534819fc389af6847692fb132e5a56752
SHA1c4e78a5f47b50e45ea21f20b10347303193cb76a
SHA25689f4d4fa4b516b3d4e6c1a7e0dc58e58e8d38fe71795b9f017854210bdf42b1f
SHA512dd4263034d037e7e1a4cbdca40ea64c485ef0ec6faaec9d8a4a1c3c0c25945c57de0a7b9cf70c98d88d9cf146c9990278aba163cbca2c8f511dd2bd1c0fb4ce8
-
Filesize
173KB
MD570c294c84162404fcae659536d6b7439
SHA175be4bfb2c54997cf07d4a279abd985d51964f00
SHA256f0ec4ecae7468b0784c27bc7095f0047165c02986a534bf119a9c8e9bae4b865
SHA512a5c921886046d11ada6105611533a0e492648320c057852223ab4571599c8b47b7f7d04a1b4454b32b0bea8dc5884a0b466f1c0b308c05d24a36e65143a8a1b7