Analysis
-
max time kernel
179s -
max time network
190s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
21-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
-
Size
4.3MB
-
MD5
9ee4c02bcaebd64f5f26c477b2280b99
-
SHA1
7c148e660ca0c6f0997f59e4c74d684d42ec6325
-
SHA256
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e
-
SHA512
14cd98c1f8ca879673a53f4283f53fea7b8d98bccc0fd4dd994b04fd46de157167047beb56bf9112c882d4e5e6dca1ea55a98fed02c38f8e736f7046181885e5
-
SSDEEP
98304:NESNZZnj/3UlpvuLBjRgfrQB+giaLVtOvHxaqCV3UTCMEnTdFRq6:NXbn7AKBtKFgiuVEvXCVY6pTt
Malware Config
Extracted
hook
http://149.50.108.117
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ovuknozlo.dqibqmypp/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ovuknozlo.dqibqmypp/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex 4259 com.ovuknozlo.dqibqmypp /data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex 4294 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ovuknozlo.dqibqmypp/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex 4259 com.ovuknozlo.dqibqmypp -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ovuknozlo.dqibqmypp Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ovuknozlo.dqibqmypp Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ovuknozlo.dqibqmypp -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ovuknozlo.dqibqmypp -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ovuknozlo.dqibqmypp -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ovuknozlo.dqibqmypp -
Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ovuknozlo.dqibqmyppioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ovuknozlo.dqibqmypp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ovuknozlo.dqibqmypp -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.ovuknozlo.dqibqmypp -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.ovuknozlo.dqibqmypp -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.ovuknozlo.dqibqmypp -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.ovuknozlo.dqibqmypp -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.ovuknozlo.dqibqmypp
Processes
-
com.ovuknozlo.dqibqmypp1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4259 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ovuknozlo.dqibqmypp/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4294
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD547089e28f049d6d333d643795124dcc1
SHA1f0edf0c1b1ef0bfc2c70bc4c3c55c881e1e17d22
SHA256c57665652c38ad124084fb9ce6eee2e30bf0c7beca6a46da7b4590099539ae47
SHA512d29da054505612003f963d177f3d03345e4205bc593f527fe379827e4c37a737ef25c85b72f82ef679836cb415a996ea1aedd846b2305723e578e9adfb2b600d
-
Filesize
1.0MB
MD5e4cc0c2a8795010a344d3fe9d295dfa0
SHA1f7395885fa6a6e6718377485dfd1600b9c0e08a9
SHA256ed92ccc308adad9ff9517b3cb9cf5196911867531e7484f26669442bad44d865
SHA51294ce3d3e9235b066e6adce2561e770d0a167bd6854128f6455097e1a53ece827ecb3fb67bc0c3c686a82c58eea6296a111f80d522a8ce14cb3746b62ac143b66
-
Filesize
1.0MB
MD5da8683d5f81f9d008ffe3ebda018349c
SHA16f4c742c349ed34112ce745fe3276170dbdaae08
SHA256e72a8068d1cf07e1a6d2ce381eb3ff6dff9296010773b3c421b080f007867828
SHA5120df112997b492d114ff8134e56d27747f32341aaaca04ca301e65535fd3bba83007d2a5dd757fca46d49ec31270020f16e4720d38fd5a5697ba206ce3bb4f108
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5c859794ddd7e10c2b3966ec87de7e18e
SHA13e00471947e8a99141c002b0c3146f2799bff6b3
SHA2565128eb851870fb52e313140304110d6cebc658080e665adc2e949f96ee5da4b0
SHA512090a2036fce6f1031691ff3fb97e6fd79c109b741ced98e64edcdebb778f1cc91c465b93636c4696c28e6408ddd42095a58cfb2d857885e185d4d408eb5471fd
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD53b2d87a307f708e8c7c8b367cbd84184
SHA13d8440b06fdffbe4810d702cfc0c317e258dab0e
SHA2568783ec1e8093b97076bded07be9b7398c755869980bf814bb5725f7c4bf3946e
SHA512bba1a01930fa9b6d2c6acd052a6b09784100f42ed4fd68f9f8c2e574da2f0ca795a4881e1d083eedf207cc0ab3de973ffaabe3c56ed57dae776bba7ac3aa1ecd
-
Filesize
173KB
MD5907275b78fc39c1e80b8f6b124a73828
SHA1dc0f5c3b17f04eac3682d05375d77e2015678041
SHA2568564846390e44c37be2654b12edd9bd31b63c26e7caf89ee1414e0b8ab801323
SHA5128af42a3baf62645e35de27bc294606d3e282ab255f3ea9705b46ec7e3a1f7cd7aee99300ca08b9aedc4bb04ea58cc7d245e8d98bff86db702f259dc4117ddda2
-
Filesize
16KB
MD556b2d94c476c9bd08b55d637b2190303
SHA16cd81ef66318d136e4a8fa09813a8dc6e5f5d07f
SHA256b282bbff6946f7e3faa29b9747c6957bc1feb14582c484ebc318141ce487819c
SHA512845de02186a3b349df9f2ff7ac2e666230003d193531de11eb245b6f2edc4587e7dbff501f285b72fe9e10e81d03d7557bc127980ea4cc6f6b6637ebfc4459ff
-
Filesize
2.9MB
MD5e289aad6fa54b8fa560c674d2b3b51c3
SHA100b468956f34f8bbc2ac3b9d8182503f84fdc8ff
SHA256fce93fd72bf73524f6a161b729d9f41e6b52fa775cf9855001f8db550842f3b2
SHA512b77f15cf50de3f4167f83da90bfd38114311dce721e969ca67bcc52c4a1e6248c43a4128df4939be40fe9c643fbaad3de3b5958e53c4677dcf92c74199c33ca1