Analysis
-
max time kernel
167s -
max time network
192s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
16-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
7092a0a9c8fb77919be304b32f30f1c117c874347a3abdc459b933dcc5a0e1b8.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
7092a0a9c8fb77919be304b32f30f1c117c874347a3abdc459b933dcc5a0e1b8.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
7092a0a9c8fb77919be304b32f30f1c117c874347a3abdc459b933dcc5a0e1b8.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
7092a0a9c8fb77919be304b32f30f1c117c874347a3abdc459b933dcc5a0e1b8.apk
-
Size
4.3MB
-
MD5
7f26ffde8f6049e40018e3898c537dd8
-
SHA1
cbad61b35a5e2f4f6e148a09de7f49f1903e88f8
-
SHA256
7092a0a9c8fb77919be304b32f30f1c117c874347a3abdc459b933dcc5a0e1b8
-
SHA512
6d1a293800807b13dd84e1fa80aef2af0564fbcd1d8e1e682f75f3c016b50a5630c0100bd681640faab29747fcc91bb428cadecc77d4291614e69e5dd60ec6ad
-
SSDEEP
98304:dHUDd8tHdpUeRktv6RYQstbe96BoP3G5C6YtG:d0DUd0tv2YtnBIAks
Malware Config
Extracted
hook
http://80.64.30.149
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.svmzvvxeg.ikxwixmgq/app_dex/classes.dex 4513 com.svmzvvxeg.ikxwixmgq /data/user/0/com.svmzvvxeg.ikxwixmgq/app_dex/classes.dex 4513 com.svmzvvxeg.ikxwixmgq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.svmzvvxeg.ikxwixmgq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.svmzvvxeg.ikxwixmgq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.svmzvvxeg.ikxwixmgq -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.svmzvvxeg.ikxwixmgq -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.svmzvvxeg.ikxwixmgq -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.svmzvvxeg.ikxwixmgq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.svmzvvxeg.ikxwixmgq -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.svmzvvxeg.ikxwixmgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.svmzvvxeg.ikxwixmgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.svmzvvxeg.ikxwixmgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.svmzvvxeg.ikxwixmgq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.svmzvvxeg.ikxwixmgq -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.svmzvvxeg.ikxwixmgq -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.svmzvvxeg.ikxwixmgq -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.svmzvvxeg.ikxwixmgq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.svmzvvxeg.ikxwixmgq -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.svmzvvxeg.ikxwixmgq -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.svmzvvxeg.ikxwixmgq
Processes
-
com.svmzvvxeg.ikxwixmgq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4513
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5a03cd805d85b7e3b78bf0876659800f9
SHA1c1f601fa4689ecb3bff64d3e3129458d9b2d247e
SHA2564a5d61d7d87cea4877ee74a8e3eb88d0df9368d13d5e143a46236a4a6d5a7252
SHA512b4d929bc61c70a9ca4abc59f5708e90e281bb5239799bfee524f2c20be52e4c31acc60221d2f18f3479b2da175709aea450917566636952e9146c993c8452f7a
-
Filesize
1.0MB
MD54467e222f8aa4929d242e2e64583b6bb
SHA1e8df27bec69231e2cc54ef1a89a253a6b4f416bc
SHA256fc25c6e7c969bd956e23c792ef7dfb436ee98aa41e03fc87d1728a48f47331b5
SHA51247912e4cd90933fded308eac9558277f1cbae0c26fd934c928d3e3044c1edb2e54b0428b4834cb4638bbef96324718dcec462e776cd49ecdce37f20176eaebcd
-
Filesize
1.0MB
MD54c46ab45bdb0de666f61170cdf8cfd78
SHA115ba7a31966b70e9226b7821d64c87f04ff5db16
SHA2561b8464ddeec4b13d36cdf2c7d5a45d42cce9b51f547196af8b3a22c7ab8a61fd
SHA5128956fefb392164b53f011409d96c826222e92c3219bfc9d9819f2363b43fbd9c7d9be780ff89849c4874f6cce2254bf135a519cc90def9ecb983de5d0e6c9f86
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD54c7057128526a2f3370d7572afded578
SHA1b267c1eca9dc2b39d7a12a39d7d3a077ea3c98f0
SHA256ea4af396c1dab69d0939882dad26901941556b2cff2191586ecb3c7ae14b4426
SHA5128f4147d39fea39db3e3f792281149dad915e82159ced3d0a3fabaf2fe149b649b08a5da7d2e9006ac4d7e91ca09658516df3be400c2b1e7d346825b9cac4c185
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5d4b464a595aef0657a3653a68acce40f
SHA11bb1d10fa120d186c97c656ca641a9b6c4338d37
SHA256726e4ecf0d0d25b4efa4b6d10f2fa685ac62649fe2d2bf0fd62c60dca9cf249e
SHA512102afb26e7d49d0dd3f630f2568fc9b51ababb7d85c13dd11238de90c9d0f178d57e001114e533741ca99c36992dade9b7317ab4dc33c74b3ebfc592aba6f34d
-
Filesize
108KB
MD55d1816f51f4b63300f2d6db2ae31f02b
SHA1d5103a073fb454eb63630707c566272d9174e849
SHA2563cee34cd1e73b522cd429222f6e62d84d72a65162eb50a17cdd2e9d699702992
SHA51255f430625912c8027bd270d0aa78688f759b06776ad6f8923289d9bb8e4d66ea33b7b732112c2c3b6de682812aff579ecd98a1cfc876582229523ad8202baf3a
-
Filesize
173KB
MD5eceb0ff265629b4eb29601d2302441a7
SHA1377964df884eb9c9a5501336f2537a87d2f351e0
SHA2565bb0617b792a2823cfc6719e3af4f51ef98de561a9bc06412577ea004ff7b01d
SHA51295012b9a95c760918c51202979d8b1a661ae14e87f944b85ad358f4fd08d8eebcc0da248d5d953a3f53bb17afa083f6b92429ad9562e27b31045963101d3a49e