Analysis
-
max time kernel
178s -
max time network
190s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
13-08-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756.apk
-
Size
4.2MB
-
MD5
2341dd73ad23f53bc3a9bd1269fb2096
-
SHA1
b7c10cff0d8018a83eb2fe93826a72228d590df3
-
SHA256
b6ed31e0329c6ab919b874b4a4f02c9ee10e57a0b0114cc7fae802b593d85756
-
SHA512
e95766f257e1fbe2e47395171a0aaea554c42a7baa3d232c3ca23b725ce9eb8de2ce5caa165f3ce61bd967a4c05bca37c543fd75329aaf586cf8c80284ec71f0
-
SSDEEP
98304:U3iHKtQtOPdcmMAXWADwV0rrZT7RMraW+IG0u4j1Oqz:DqtQtOPdFXNwVOtTOc3cj1Fz
Malware Config
Extracted
hook
http://134.255.180.156
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex 4470 com.cdnbwsqqe.dxmznskla /data/user/0/com.cdnbwsqqe.dxmznskla/app_dex/classes.dex 4470 com.cdnbwsqqe.dxmznskla -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.cdnbwsqqe.dxmznskla Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cdnbwsqqe.dxmznskla Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cdnbwsqqe.dxmznskla -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.cdnbwsqqe.dxmznskla -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.cdnbwsqqe.dxmznskla -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cdnbwsqqe.dxmznskla -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.cdnbwsqqe.dxmznskla -
Performs UI accessibility actions on behalf of the user 1 TTPs 22 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cdnbwsqqe.dxmznskla -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cdnbwsqqe.dxmznskla -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.cdnbwsqqe.dxmznskla -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.cdnbwsqqe.dxmznskla -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.cdnbwsqqe.dxmznskla -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.cdnbwsqqe.dxmznskla -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.cdnbwsqqe.dxmznskla
Processes
-
com.cdnbwsqqe.dxmznskla1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4470
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD51d4c515f2288e6fe666ad3df34a20f6a
SHA1613152f617d917908fa4f086a789cab9c0c953e5
SHA25600e64c5197f6697692b326a3495eb62e97b3ff11bd12adf6dc287fed1de9d37a
SHA5122a29bbff859774c2c9105ed7cbb9d1a596d352ef28afa8fa44fb49464e962f02a6877e6dda87392e7d466d61fcea8cf252f6135f7bdf9164b49fc26a96454212
-
Filesize
1.0MB
MD59447ea843495097b9e07a7b657929ce6
SHA1ff4f849f561910a008501c2494349419eb4a94f1
SHA2565b13538022406312a946eb7f897ed0b613bffc88f35bcd00750e12081c04fffc
SHA5123952d88d8134f02dc8ed6972a3055eb24463013f14df97a4aa18497d52fcf60d3f571514048504b8cba88d466f954e5adfb889ed6fd9f7a685d126fb42fd0ecc
-
Filesize
1.0MB
MD5b7a1d2fd02122ba2cb316d1ebdb50a20
SHA13773617b00e07612fd8069d78a9f15ae307c7a24
SHA256f4899f302c0370f556fa3a89ab3103a9db26d02b6b6856f7f0c8e4487e115467
SHA512890570c671dfc3fc86af420bf23de01bd9b54584ec5e7f8a6f335be9e625aa6d1deffab39500057f42a77227acea20085e199f5858db844af15f013487fe6c44
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD56b2b17f3db79ff2da34ca4042efd303f
SHA11450a31270fe965f814573a7e5ed3087a3243c69
SHA2567fd9248f695ee6730845b12075626ac60e3d31ec47660247db365df964cf5959
SHA512694858bf8c8fe71690521a24f5da0eb3a2756d25c58d109295442ec8735f297117093eae39a31f64f54645ac83f3eddf358e7ae21b2b293f3b3b6fb828106d46
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD59039d8da1de0dfaeae5a15779733870c
SHA1655af25adf6e303998eb91855c330df8639e7ad7
SHA25678d975c0e42c76b264123f6158dfe6fd8609c8e4e0e519759b3b4828a4a85d9b
SHA512ca7da313d5acf9653fb220d05eeab0a6419b2233b4c7a74b11f82ca9b6c8169315a511c46a54d5768f62bfcc9024686bd22971faf841be3753c545e2c0a81042
-
Filesize
108KB
MD59d5113c7711d6b773c663e0bd0600cb7
SHA171edff0d056b1bfd912550fcac6471162f871ac5
SHA2564fbb6e23e4c1b32b1d330fac62c6cbebacb2c6cc92e64334f2c1426df0aabaee
SHA512eb812ce1d4ca31dcb0e603bdff74b5e74979be86c44d43adbbc69424e7a135c724a03fdffc3a89ab4e742a7b5534b186bb724d671cf59bc998de9df72035cab0
-
Filesize
173KB
MD558348a9a1ab0819e6c6fd1ee0691d1a9
SHA168f4d94d354480e6517bc120fe5d4442c7a62634
SHA256506efb941f2688b3bf7875fc01edf782af0f5c1ada2428d05d5e2a48c2b66b12
SHA51256b7902a18ba2f029db46e25e124d147910ca1dcff887acbf68978066898ba1d3475be07a2a36beda64f232885f22d09fd429fb2fa78b1780cdd4536b9ecaa3d