Malware Analysis Report

2025-01-19 05:20

Sample ID 240824-mb7y6axcjp
Target f76524d907aa6b2e6f192e3e513622ab31489997d0754df775f9f5e8e111e3e4.zip
SHA256 ed312ad4570dcc30aea67e40b672c4735fcecebef8a24190f9317149376cd5fb
Tags
collection credential_access discovery evasion execution persistence stealth trojan
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

ed312ad4570dcc30aea67e40b672c4735fcecebef8a24190f9317149376cd5fb

Threat Level: Likely malicious

The file f76524d907aa6b2e6f192e3e513622ab31489997d0754df775f9f5e8e111e3e4.zip was found to be: Likely malicious.

Malicious Activity Summary

collection credential_access discovery evasion execution persistence stealth trojan

Removes its main activity from the application launcher

Loads dropped Dex/Jar

Queries the phone number (MSISDN for GSM devices)

Makes use of the framework's Accessibility service

Requests accessing notifications (often used to intercept notifications before users become aware).

Requests disabling of battery optimizations (often used to enable hiding in the background).

Makes use of the framework's foreground persistence service

Queries the mobile country code (MCC)

Requests dangerous framework permissions

Declares services with permission to bind to the system

Requests enabling of the accessibility settings.

Acquires the wake lock

Performs UI accessibility actions on behalf of the user

Queries information about active data network

Listens for changes in the sensor environment (might be used to detect emulation)

Registers a broadcast receiver at runtime (usually for listening for system events)

Schedules tasks to execute at a specified time

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-24 10:18

Signatures

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-24 10:18

Reported

2024-08-24 10:20

Platform

android-x86-arm-20240624-en

Max time kernel

95s

Max time network

84s

Command Line

btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Listens for changes in the sensor environment (might be used to detect emulation)

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Processes

btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/oat/x86/cca.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.213.10:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 zeusky.ac.ug udp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

/data/data/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json

MD5 0e5739c89dfe5f9dd8f93841560dbb47
SHA1 3f507351b592fc133c5e930f26f9565108e978b3
SHA256 d77cfdc3c783695a1776b033f409dc5375990de3f4272f73c2008fe426600a1c
SHA512 73fe1cf143b223608db3ca05c9978516692f6bfe6ffabc3e06a4892c855929e2dc18659e8b51c36b26627ddd637da571fd8b29c8e011235c04aa51b50e5cd2ae

/data/data/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json

MD5 818950cda870ce6b4ef7b46e8ad89c29
SHA1 7ad04f6a2df89ea2c4a9935c496ea88a89f90f90
SHA256 d4884cd50ecd05387a0c2b3693fb16f39fdd6f4516337fbf54f0ab6e9a01f564
SHA512 c49c3d15c37db1da8244f33a9fb4f864dc311d6b126ba15120915a3363f198f1d5eb67c78f8a2719c8c1fef13774e17526b663bde4c0326f7d48a8ebacd7402a

/data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json

MD5 1b502db42f2ef1f8f5b6016ce0996340
SHA1 5a5add7dc790496a0e245c082e326041675d833c
SHA256 cfc89ee8db9910fc01e8f0487e37fb2d8f6ac5ffa451d9d6d953240fa4a3df06
SHA512 79f557ec6a2be10d520284d09304bf02b86440aeed3f7aedcdfe7df6b5faa71bbc5a7dc99364a5f751f302de0614f382bb4a1542d5f7dbfae72a08cb0040af69

/data/data/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/oat/cca.json.cur.prof

MD5 e7b8c0989cb1474eefe462b687cee887
SHA1 00380316cf0a1e584674fcf816d29190956b0b78
SHA256 223f7c624704159e02589eb5190da8a48d1174550a0facd05066b34ce08bcb36
SHA512 305275d6025e6c824e538b85ec816fd7e6ff71b7440c94e154ce5f40024b1f7d32bf701b00d0a2cd15b48f6def3fcfd468f23b0c5232c2eec9fcf63504a6abbb

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-24 10:18

Reported

2024-08-24 10:20

Platform

android-x64-20240624-en

Max time kernel

42s

Max time network

99s

Command Line

btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Listens for changes in the sensor environment (might be used to detect emulation)

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Processes

btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
US 1.1.1.1:53 zeusky.ac.ug udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.187.234:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
GB 142.250.179.234:443 semanticlocation-pa.googleapis.com tcp
GB 172.217.16.238:443 tcp
GB 142.250.179.226:443 tcp

Files

/data/data/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json

MD5 0e5739c89dfe5f9dd8f93841560dbb47
SHA1 3f507351b592fc133c5e930f26f9565108e978b3
SHA256 d77cfdc3c783695a1776b033f409dc5375990de3f4272f73c2008fe426600a1c
SHA512 73fe1cf143b223608db3ca05c9978516692f6bfe6ffabc3e06a4892c855929e2dc18659e8b51c36b26627ddd637da571fd8b29c8e011235c04aa51b50e5cd2ae

/data/data/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json

MD5 818950cda870ce6b4ef7b46e8ad89c29
SHA1 7ad04f6a2df89ea2c4a9935c496ea88a89f90f90
SHA256 d4884cd50ecd05387a0c2b3693fb16f39fdd6f4516337fbf54f0ab6e9a01f564
SHA512 c49c3d15c37db1da8244f33a9fb4f864dc311d6b126ba15120915a3363f198f1d5eb67c78f8a2719c8c1fef13774e17526b663bde4c0326f7d48a8ebacd7402a

Analysis: behavioral3

Detonation Overview

Submitted

2024-08-24 10:18

Reported

2024-08-24 10:20

Platform

android-x64-arm64-20240624-en

Max time kernel

42s

Max time network

90s

Command Line

btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz

Signatures

Removes its main activity from the application launcher

stealth trojan evasion
Description Indicator Process Target
N/A N/A N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A
N/A /data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json N/A N/A

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Performs UI accessibility actions on behalf of the user

evasion
Description Indicator Process Target
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A
N/A android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction N/A N/A

Requests accessing notifications (often used to intercept notifications before users become aware).

collection credential_access
Description Indicator Process Target
Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Requests enabling of the accessibility settings.

Description Indicator Process Target
Intent action android.settings.ACCESSIBILITY_SETTINGS N/A N/A

Listens for changes in the sensor environment (might be used to detect emulation)

evasion
Description Indicator Process Target
Framework API call android.hardware.SensorManager.registerListener N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Processes

btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 216.58.213.10:443 tcp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.200:443 ssl.google-analytics.com tcp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp
US 1.1.1.1:53 zeusky.ac.ug udp

Files

/data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json

MD5 0e5739c89dfe5f9dd8f93841560dbb47
SHA1 3f507351b592fc133c5e930f26f9565108e978b3
SHA256 d77cfdc3c783695a1776b033f409dc5375990de3f4272f73c2008fe426600a1c
SHA512 73fe1cf143b223608db3ca05c9978516692f6bfe6ffabc3e06a4892c855929e2dc18659e8b51c36b26627ddd637da571fd8b29c8e011235c04aa51b50e5cd2ae

/data/user/0/btkyxyc.kowtwacupumntmcf.qiwehukjxrxmukpisz/app_DynamicOptDex/cca.json

MD5 818950cda870ce6b4ef7b46e8ad89c29
SHA1 7ad04f6a2df89ea2c4a9935c496ea88a89f90f90
SHA256 d4884cd50ecd05387a0c2b3693fb16f39fdd6f4516337fbf54f0ab6e9a01f564
SHA512 c49c3d15c37db1da8244f33a9fb4f864dc311d6b126ba15120915a3363f198f1d5eb67c78f8a2719c8c1fef13774e17526b663bde4c0326f7d48a8ebacd7402a