Analysis
-
max time kernel
177s -
max time network
187s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
20-08-2024 22:02
Behavioral task
behavioral1
Sample
8d470b7a0654582bc81abfa0dfc754af84f124c4a5740881577b7c9a5fdfc632.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
8d470b7a0654582bc81abfa0dfc754af84f124c4a5740881577b7c9a5fdfc632.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
8d470b7a0654582bc81abfa0dfc754af84f124c4a5740881577b7c9a5fdfc632.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
8d470b7a0654582bc81abfa0dfc754af84f124c4a5740881577b7c9a5fdfc632.apk
-
Size
3.5MB
-
MD5
afc32b5dd52d8a2e1a78eff6e64d71cd
-
SHA1
580ada9a31c1cb9733ddfe7faeeedab1c1e22786
-
SHA256
8d470b7a0654582bc81abfa0dfc754af84f124c4a5740881577b7c9a5fdfc632
-
SHA512
d1a492e7e3ba9a31f8d30968003bb6fba77ff7d7fb5b582c81c5e95ae56f2931956ace20a1696a68a2a4eec7cedfe90117a11e4f814958efafeb1b623004ecf1
-
SSDEEP
98304:B2T6h63jiK81LqcyoAdtxv6kVHJEtTJPwSoNB:ou6WKSLqccR8RNoD
Malware Config
Extracted
hook
http://91.92.245.16:8082
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.dawufisunagula.zoka Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.dawufisunagula.zoka Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.dawufisunagula.zoka -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.dawufisunagula.zoka -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dawufisunagula.zoka -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.dawufisunagula.zoka -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.dawufisunagula.zoka -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.dawufisunagula.zoka -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.dawufisunagula.zoka -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.dawufisunagula.zoka -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.dawufisunagula.zokadescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.dawufisunagula.zoka -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.dawufisunagula.zokadescription ioc process Framework API call javax.crypto.Cipher.doFinal com.dawufisunagula.zoka -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.dawufisunagula.zokadescription ioc process File opened for read /proc/cpuinfo com.dawufisunagula.zoka -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.dawufisunagula.zokadescription ioc process File opened for read /proc/meminfo com.dawufisunagula.zoka
Processes
-
com.dawufisunagula.zoka1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5001
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5e9894c114f5ea68975b09373bf66b14a
SHA1d18251cc740ae543a6cd0ec054f5b04848c24757
SHA256502e1314f14ea014ff68c534199fa60d220358f8e6c37369ef3c5c6c58d1db86
SHA5122a5f265e2ce84461772d192c90671999568be249f4c9892021a46d2cb7370b90e9d89f3d560d13e243b876d48c721af79e9487173bcf7d77ab8214e486f1f033
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5b18150bda317faadecc7913145f7a204
SHA126564cf26dcaef1a0a8318917a4710bd840c72c5
SHA25629a371f7aab3ed2fe03d266b67f8afcc3592fe60e6caf15bc962d49b62a633bd
SHA5128820bacac5dcd3f731ae28f4113e68257b88ec40b9005792978e5dfe9cba8e36d0fd27fd113762c03fdce504b4508f2b669b8d6ea1c0352a81d930fb69d6f177
-
Filesize
108KB
MD5133d7f537f8ca2c9f3c60d58550a2b7d
SHA1072d20539da8dd84fd213e0366667e413708685f
SHA2569f451cf8542f2ac8701477f69c0b89ab31160a9256386eda4326a245c10e7d8b
SHA512cfddff1ea80a3454d548f3dfb8c497c702541924f94169f7b4e34863bb060a114c423caa2d6a1d07e4d58a656a29284b431369af60d45be9659fcdd7db88330b
-
Filesize
173KB
MD51824a423e10d85fc55e96a11a3f6aa1f
SHA17eccd3b93958b4f5cf60d0a4646b112d88d500ea
SHA2563f024a47f859800ad73cb890654422f5c64d57489a91572bd391db7a7547fe35
SHA5125a36e250292940377507f60ebc1d374f61d21b0dc17743ff83a17de5454ae682980974169fc56e8ac2a23a6229a4835b9f21dd883cda182540088b20b04284f1