Analysis
-
max time kernel
179s -
max time network
192s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
13-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
-
Size
4.2MB
-
MD5
2341dd73ad23f53bc3a9bd1269fb2096
-
SHA1
b7c10cff0d8018a83eb2fe93826a72228d590df3
-
SHA256
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756
-
SHA512
e95766f257e1fbe2e47395171a0aaea554c42a7baa3d232c3ca23b725ce9eb8de2ce5caa165f3ce61bd967a4c05bca37c543fd75329aaf586cf8c80284ec71f0
-
SSDEEP
98304:U3iHKtQtOPdcmMAXWADwV0rrZT7RMraW+IG0u4j1Oqz:DqtQtOPdFXNwVOtTOc3cj1Fz
Malware Config
Extracted
hook
http://134.255.180.156
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Processes:
com.cdnbwsqqe.dxmznsklapid process 4261 com.cdnbwsqqe.dxmznskla -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cdnbwsqqe.dxmznskla/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex 4261 com.cdnbwsqqe.dxmznskla /data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex 4290 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex 4261 com.cdnbwsqqe.dxmznskla -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cdnbwsqqe.dxmznskla Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.cdnbwsqqe.dxmznskla Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cdnbwsqqe.dxmznskla -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.cdnbwsqqe.dxmznskla -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.cdnbwsqqe.dxmznskla -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.cdnbwsqqe.dxmznskla -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.cdnbwsqqe.dxmznsklaioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cdnbwsqqe.dxmznskla -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.cdnbwsqqe.dxmznskla -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.cdnbwsqqe.dxmznskla -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.cdnbwsqqe.dxmznskla -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.cdnbwsqqe.dxmznskladescription ioc process Framework API call javax.crypto.Cipher.doFinal com.cdnbwsqqe.dxmznskla
Processes
-
com.cdnbwsqqe.dxmznskla1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4261 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4290
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD51d4c515f2288e6fe666ad3df34a20f6a
SHA1613152f617d917908fa4f086a789cab9c0c953e5
SHA25600e64c5197f6697692b326a3495eb62e97b3ff11bd12adf6dc287fed1de9d37a
SHA5122a29bbff859774c2c9105ed7cbb9d1a596d352ef28afa8fa44fb49464e962f02a6877e6dda87392e7d466d61fcea8cf252f6135f7bdf9164b49fc26a96454212
-
Filesize
1.0MB
MD59447ea843495097b9e07a7b657929ce6
SHA1ff4f849f561910a008501c2494349419eb4a94f1
SHA2565b13538022406312a946eb7f897ed0b613bffc88f35bcd00750e12081c04fffc
SHA5123952d88d8134f02dc8ed6972a3055eb24463013f14df97a4aa18497d52fcf60d3f571514048504b8cba88d466f954e5adfb889ed6fd9f7a685d126fb42fd0ecc
-
Filesize
1.0MB
MD5b7a1d2fd02122ba2cb316d1ebdb50a20
SHA13773617b00e07612fd8069d78a9f15ae307c7a24
SHA256f4899f302c0370f556fa3a89ab3103a9db26d02b6b6856f7f0c8e4487e115467
SHA512890570c671dfc3fc86af420bf23de01bd9b54584ec5e7f8a6f335be9e625aa6d1deffab39500057f42a77227acea20085e199f5858db844af15f013487fe6c44
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD568cae119350afd8cb6dff67a75056a85
SHA1f367724bfe3f73504d4d42be09303b61b6ef6605
SHA256ac7aed89236a23684b79ce26843478587ddf71c5109ba9e3fd79061be4fb35bc
SHA512007e593b18c69f8f8af45ca636fb7c96cdfe69a4092338c8770eed45ef405a87ffe60f8f884334a12f60807f05bbc4cd9bc2ee9215aa7c2abd3bf6c79e7d6236
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD582e7f3260066c92805997ef46504141c
SHA1eb5bc0d9a56f0581fa8ada465c1a580cd989c854
SHA2569082b3e797b6ba4fabfd7ab91becea0a1048fcaf645a46e6425e8936214b12d0
SHA512207e9fcdaf09d1255e1f2b3b8bc6abdbf5474f0ec01594ebf97f46e307abba4855fd57f77ac1594696859c67df2a710701768b62c61b26370cb2d03238fb1c61
-
Filesize
173KB
MD5fc3099006506dc0ed3391666336e9cda
SHA16b6b15120b77737f2c6e78ceb8dfc3292cfe32d5
SHA2569ef9f6ac0b4ca6fa4c1815908aa6917d44d3b54e5937eb6dc14acf355f40cc88
SHA5124d47f7cfad72cbb9b4ab5e764e175f32e0672b3e55afc09fb17eb7c32172cc6076f15097c38de8e7984bdb4e37d80550b1a0a2460056fbb8ceec57250e33c1ee
-
Filesize
16KB
MD5c4edf1609fbcd727c9dbd8d808f73c1d
SHA1db5f01e561d457118454685f23fdd1c7a56d9ed5
SHA256445c078b4cd6001ac9cd36ed2f83fc78a9befaee8dc40614f04ac9f07872d7cf
SHA512a4784167bbe79a6a353c99d5c17f38af96f2ac2978b0b7aa701b834fc283abacfad2258eae0a280a6b32a5df4b07e485163bf8cc1eafb85e46141ef7a3495f9a
-
Filesize
2.9MB
MD5c395d76628094c84dd2dba4ea3579415
SHA190e6c0b5db8434184a3000b57d2557452d77581a
SHA25681122feb563280bce1e4ba76da3c6b3f224550c7966a0502a2fedb7819924016
SHA5123bbf3be33c7050aee00cd50747502cbf8f64c96a1ef64f3e59192584e5237b05260c60bf8a74c0e78c9de9efb0536e8ea451fb1eb66b1bef1455b6cb7cf96bda