Analysis
-
max time kernel
162s -
max time network
188s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
13-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
b48ab785b4e48facdfbb2ab8d85751bbefabb881e345dffaf8a4cc1ead44c858.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b48ab785b4e48facdfbb2ab8d85751bbefabb881e345dffaf8a4cc1ead44c858.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b48ab785b4e48facdfbb2ab8d85751bbefabb881e345dffaf8a4cc1ead44c858.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b48ab785b4e48facdfbb2ab8d85751bbefabb881e345dffaf8a4cc1ead44c858.apk
-
Size
4.2MB
-
MD5
da4e0f985b07fab3a045fb6d7f2ce398
-
SHA1
3ca9928e71cbd5d8644f479d4ff271db0e19f472
-
SHA256
b48ab785b4e48facdfbb2ab8d85751bbefabb881e345dffaf8a4cc1ead44c858
-
SHA512
c1afb0e7bbd44d54df134e77029ddcd181e817d6f2022446b316c5f2720bc817d21bee6571e6b89a1e932a6996f5a1c3e95e29dbe01fc9378cfa6f1c145acf85
-
SSDEEP
98304:VCKOgBNoIBdl6gcoXveOE2k1YLqPhjQEQ+Jt1MsigHy:0wyIBdlFN/eOCYisEQ+n13iV
Malware Config
Extracted
hook
http://134.255.180.156
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ynvokquxf.prtaaurasioc pid process /data/user/0/com.ynvokquxf.prtaauras/app_dex/classes.dex 4478 com.ynvokquxf.prtaauras /data/user/0/com.ynvokquxf.prtaauras/app_dex/classes.dex 4478 com.ynvokquxf.prtaauras -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ynvokquxf.prtaauras Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ynvokquxf.prtaauras Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ynvokquxf.prtaauras -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ynvokquxf.prtaauras -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ynvokquxf.prtaauras -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ynvokquxf.prtaauras -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ynvokquxf.prtaauras -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ynvokquxf.prtaaurasioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ynvokquxf.prtaauras android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ynvokquxf.prtaauras android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ynvokquxf.prtaauras android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ynvokquxf.prtaauras android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ynvokquxf.prtaauras -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ynvokquxf.prtaauras -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.ynvokquxf.prtaauras -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.ynvokquxf.prtaaurasdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.ynvokquxf.prtaauras -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.ynvokquxf.prtaaurasdescription ioc process File opened for read /proc/cpuinfo com.ynvokquxf.prtaauras -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.ynvokquxf.prtaaurasdescription ioc process File opened for read /proc/meminfo com.ynvokquxf.prtaauras
Processes
-
com.ynvokquxf.prtaauras1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4478
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD54044d416d15df7d10971d6a98db761cf
SHA19dcedadc7ca16e1127a0eb4fb71bbdb11e015c9b
SHA25693c8cdb82d902f5545d54a4e020dbb3fc7652e56b3bf4667fe3366ea8b475076
SHA512f67c02cdae6bfa4ba03739518b62f94cc5320aa5347be30a12cd4ff18ff34c0f83870dc05d4515fb336d29dbcdb4e933e894336e6708e243ed73a65f494f3f19
-
Filesize
1.0MB
MD5968b64f2d40f2c1589b7d65b087b956f
SHA1ce09248d088829f486ce974577a4d8365131c862
SHA256d9985f79cffae4b0773d07e45e5c91cfb78ab8a95b186cd7e80fb406d47d76e7
SHA5128ac46e7ac19f322120b495a7f7f09841531f0de0775f1606be12fac9c605baa1878e47af53361ccda83598014294ded7141f2be606647b8654202dcdca2efb4d
-
Filesize
1.0MB
MD55eb2c9d9f39079825bc93741f80a44a0
SHA184a6d280923e218af3bffb924761696b60556666
SHA256494a078b0a67c2e75d13b33d79a2a24b1c7d63ddbac35e42e4ad355a05225335
SHA5129fc5b64b50051e5f276493e8a7b82a0a69799f2ba69435f5c66344db427da53fc1347e1acca69c7e5db25c9ec80f1af7846e3157b3775301ad978b974dc6f916
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD50c1d3251c150c96ac857231e8817ad76
SHA11d000fbb5884d9dc3e0e5bec0e00df1765347cfb
SHA256dcbb285694bcdcfc66bc1996977096d90297323d1dc4f2bbbf3b64295447ddbd
SHA512cc4735558d6767ee6cd2a4c2c880df56a330dd1c45833566d088aeb805137edd3276f08df0f56b963d0fb99ecb4a7f2dbd3e2cd09c7775b24c70b57c2439a3e7
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD559b7c0529bf55bf2a073e10332012df8
SHA168b9292ad19936a1ad98e462584bdf954f810bf4
SHA256a9dff66086fa6f94a89bf76bb2b0c5f32352c5449d30eb1612ac9a0ff41b6959
SHA512887e79df2e18c2dad58b4982d980e791447947b487f8a663db7fb9d55a49d229417e11dcc288c9743fe02332bf4978cc0d55ab5303b0ed7d097218f115386a9e
-
Filesize
108KB
MD51a93fa32e6723644c0b408fc3c78114b
SHA131820ab62118a0c5f35d7c81b9c231553903337f
SHA256c948ec81d5ab72280e969dcb3215a67fc3aff71d7a9c969363175efbdba191f1
SHA51293cb2e1b2b1ec0dd772aad61e5edcd07d07211b9c2eacc01b8691f75a3637cf5e6c00c7f42c963ca69771408a1a7a9ad6fa8e73fa03747a9ca61935f6960f0eb
-
Filesize
173KB
MD535a6c3d8ad3e258eb8af5d45aa241634
SHA17cb4f058109abf9770d6ca021d2b49ccb26773d0
SHA25682cf70a1e2b7216a911e38c12fb86a25bcd6f03ffc898ce8baf02360c07c1acd
SHA512d6f2a5340615a6e18a2c904967928dc390e0dbce26cc78bc3f76703b01926bb2697e82ea40825ba74fe8cb59b0cf7ff1f1b5a22095ccd8babd1659bc34ba13e1