Analysis
-
max time kernel
178s -
max time network
192s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
21-08-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e.apk
-
Size
4.3MB
-
MD5
9ee4c02bcaebd64f5f26c477b2280b99
-
SHA1
7c148e660ca0c6f0997f59e4c74d684d42ec6325
-
SHA256
a1d8c0dd55e1d8bb887e315f8089208ba552e2ca298bc16247ea1a583705360e
-
SHA512
14cd98c1f8ca879673a53f4283f53fea7b8d98bccc0fd4dd994b04fd46de157167047beb56bf9112c882d4e5e6dca1ea55a98fed02c38f8e736f7046181885e5
-
SSDEEP
98304:NESNZZnj/3UlpvuLBjRgfrQB+giaLVtOvHxaqCV3UTCMEnTdFRq6:NXbn7AKBtKFgiuVEvXCVY6pTt
Malware Config
Extracted
hook
http://149.50.108.117
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ovuknozlo.dqibqmyppioc pid process /data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex 5096 com.ovuknozlo.dqibqmypp /data/user/0/com.ovuknozlo.dqibqmypp/app_dex/classes.dex 5096 com.ovuknozlo.dqibqmypp -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ovuknozlo.dqibqmypp Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ovuknozlo.dqibqmypp Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ovuknozlo.dqibqmypp -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ovuknozlo.dqibqmypp -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ovuknozlo.dqibqmypp -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ovuknozlo.dqibqmypp -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ovuknozlo.dqibqmyppioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ovuknozlo.dqibqmypp -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ovuknozlo.dqibqmypp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ovuknozlo.dqibqmypp -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.ovuknozlo.dqibqmypp -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.ovuknozlo.dqibqmypp -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.ovuknozlo.dqibqmyppdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.ovuknozlo.dqibqmypp
Processes
-
com.ovuknozlo.dqibqmypp1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:5096
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD547089e28f049d6d333d643795124dcc1
SHA1f0edf0c1b1ef0bfc2c70bc4c3c55c881e1e17d22
SHA256c57665652c38ad124084fb9ce6eee2e30bf0c7beca6a46da7b4590099539ae47
SHA512d29da054505612003f963d177f3d03345e4205bc593f527fe379827e4c37a737ef25c85b72f82ef679836cb415a996ea1aedd846b2305723e578e9adfb2b600d
-
Filesize
1.0MB
MD5e4cc0c2a8795010a344d3fe9d295dfa0
SHA1f7395885fa6a6e6718377485dfd1600b9c0e08a9
SHA256ed92ccc308adad9ff9517b3cb9cf5196911867531e7484f26669442bad44d865
SHA51294ce3d3e9235b066e6adce2561e770d0a167bd6854128f6455097e1a53ece827ecb3fb67bc0c3c686a82c58eea6296a111f80d522a8ce14cb3746b62ac143b66
-
Filesize
1.0MB
MD5da8683d5f81f9d008ffe3ebda018349c
SHA16f4c742c349ed34112ce745fe3276170dbdaae08
SHA256e72a8068d1cf07e1a6d2ce381eb3ff6dff9296010773b3c421b080f007867828
SHA5120df112997b492d114ff8134e56d27747f32341aaaca04ca301e65535fd3bba83007d2a5dd757fca46d49ec31270020f16e4720d38fd5a5697ba206ce3bb4f108
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD53b5ca78903b9865b7c66a3dc25130b13
SHA18b4ba844389476c7d9ff7e6ce7cf49b1ad5b25f5
SHA256c563d39adbc85e073c665a30f9d7b77a0522ac02601057136cefc813ea5d8506
SHA51205391ef34374e49280eaf629e1b7fb35c4c850b0dd5a8f18256f9c6eba1f84bb97e2b0bed87bf356f1d43a7ee936eb2447a93bfbc5ae2d4d7080036c91ded389
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD51a9a7923dbd2d09585d627f77f70e4d5
SHA1ab59406a1dd39108d05c69dc59d9b8c6429d430f
SHA2560721a315b0fff1bd38141bacc77d5daf6f2ba82abf7b20c8174e81b6957178c9
SHA5127d17d9adc70a393646d6bfcd301e908360f790902776d606ca52455a5b263ea057fb6e29916af7cbc3ee1d5d61b7fff062aeb8e0c7d0cdcda4afb8544e73c674
-
Filesize
108KB
MD54006e860c8fa5c39ca34547021acc871
SHA104d99c37f82c9cfaa9f2bdf32cbeff3fc1aeabdd
SHA256a946c7ac4fffa1f365498a6404eacf43231e7667a135e917cf1a548304645bbe
SHA51215ea3ef42c2cb9a8b3cb6fce9cf2c02e28a92392cda512b27ef4707202d2727fb5c7b6036e592fec049b19f9b575c8644e6922b67c56bf1a3b51fc64602d8fb3
-
Filesize
173KB
MD5f83bbb3a0c23d051f0083970e197e7e2
SHA1bbce564a38d0b61fd196b24dd9a2c165a6759007
SHA2564e2273ae631336556c67c4d71b880dce0e1ec35e252280bc2bbc8ea39a96e9cf
SHA5123aa2e89d8174a8422461cc26e2e8326bba6ad626383ae6d68526b475501b22772d89fcd3f71d630438bded55812a592c309a21fb053453edb51f116f2ed3a3fc