Analysis
-
max time kernel
17s -
max time network
192s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
25/08/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
cb1a58ad1add6beb867e31cc7728d45c2f28c8e35293244fb54a283197b3b9a1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
cb1a58ad1add6beb867e31cc7728d45c2f28c8e35293244fb54a283197b3b9a1.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
cb1a58ad1add6beb867e31cc7728d45c2f28c8e35293244fb54a283197b3b9a1.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
cb1a58ad1add6beb867e31cc7728d45c2f28c8e35293244fb54a283197b3b9a1.apk
-
Size
4.3MB
-
MD5
5b7957acf0c19217581e6d3b4f54337d
-
SHA1
97a73908b2b8c7d59b6237434c785907b57a0199
-
SHA256
cb1a58ad1add6beb867e31cc7728d45c2f28c8e35293244fb54a283197b3b9a1
-
SHA512
75bafbe460d497038f339beb19a295880e8caa8e125ffc58d1c2a5de4282df3f067cb5e6684fdfebf58c0c5b0b4dc74c5355d5ac0ad9c597553e74f9a7f4c45b
-
SSDEEP
98304:WmcY3AswM0ufWdg3MxMP5xbf/+Tb0xCHG3hwHgx46A52PPKWW:yQAski4MP5xDS0xCm32Hg3w2fW
Malware Config
Extracted
hook
http://80.64.30.149
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.gatqaovqr.qcgkinnnk/app_dex/classes.dex 5076 com.gatqaovqr.qcgkinnnk /data/user/0/com.gatqaovqr.qcgkinnnk/app_dex/classes.dex 5076 com.gatqaovqr.qcgkinnnk -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.gatqaovqr.qcgkinnnk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.gatqaovqr.qcgkinnnk Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.gatqaovqr.qcgkinnnk -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.gatqaovqr.qcgkinnnk -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.gatqaovqr.qcgkinnnk -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.gatqaovqr.qcgkinnnk -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.gatqaovqr.qcgkinnnk -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gatqaovqr.qcgkinnnk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gatqaovqr.qcgkinnnk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gatqaovqr.qcgkinnnk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gatqaovqr.qcgkinnnk android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gatqaovqr.qcgkinnnk -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.gatqaovqr.qcgkinnnk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gatqaovqr.qcgkinnnk -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.gatqaovqr.qcgkinnnk -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.gatqaovqr.qcgkinnnk -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.gatqaovqr.qcgkinnnk -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.gatqaovqr.qcgkinnnk -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.gatqaovqr.qcgkinnnk
Processes
-
com.gatqaovqr.qcgkinnnk1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5076
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5be230e7cac11318e05002859eb240b1c
SHA1e88665635cd884c9a51755188ac18245a0f86791
SHA2561e7cf205943f5a1873e84c0155131de7318807f484b4833b7b07eba337386281
SHA5125bdfca5309a1e9ea528595946bda1be6b3dd2dffea56431a17c986b57d39f6cf725eabb369b99b7d3f1a8bd3f48e682ca05d341061adb34cb343395cae706e2c
-
Filesize
1.0MB
MD5f0eb21b6ac7eac592fda1c766c6dc37e
SHA1f543c3c5fa2c95bb80475ecaa4a634c5ad3cd4ec
SHA256adbde97ed2ce8e8604ccd7e02b76d2b20d02709fce49ad55f5f7dd43e5131690
SHA512a6c5c4bbdfb81aecd5593539ca1e720977ec9b3765de8b7c2ff367e0c9e552b9818b2c5aa8751e16a03fa711b9d24829c6278695c63e5fff144dee0caa651ace
-
Filesize
1.0MB
MD5e7f0f18877ea6b156ac825b7d945fef3
SHA154d576f94a427852720e7ba91ec733aa876a1801
SHA256f641d42568b7776425239afb8e06fedc9425a55605c1efc00114c0fad7bcada3
SHA5127586bcd48a95c9131f2200ffc99ff03b9077149ad074c4fa961b1d7ec0b8e6b9ec54868e102697f08cad078bb8af38bc8961edabcef25df82ee5cc7ec6a89be5
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD51645337bcbcf27a2ec2af9e57d5d29de
SHA1f8adf784e703c1367838eec421abb210c071f814
SHA256ebd7611a1fb4066ef380fada9355ec21683e2abaf694e72aea7ecef596b98679
SHA512cef63029a220bc1a1984b8dc09c02fbe64889583e94f62518369054a016ff87bdf0f6da7662a53b44b0339b9c3e3fc9f83f21b2307bd0fe3693bce8a60ea1104
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD53279f43e473a2b3f64b7b631163a93f5
SHA12e0e425978188a11b7c60f5f5e948f538af3cdad
SHA2561cea8c6bb5a881dbde5c221c68ac4f44de5db14da79904427980dfdae755ddb0
SHA51248b3fd59928542fabee5f68c9c7f5c721dba923459e817d5be25b2f237d0c9d3c89a06c5b4f3db46f2018b003f63ff160198777de0cb948e7d530041d6e854df
-
Filesize
108KB
MD51dc7a7bbd55d745b0c61e25cafb804f1
SHA13b0c32136df1432617dda986cfd4b4c95769e17e
SHA25662cfcf46ad0cd2a66aa6f39349b9a4175ddca16937035376927974ac1a77d788
SHA512e7832813072cbadc73f0673850fd18bbece3aaded40828a7983ea808791c7d28c5fbc6ed847949833d2a2d74fbb6d986d73a40c20dc3db98ecafc78ac487ec18
-
Filesize
173KB
MD58932f7f5e7345e7899cf3c078c37f9b2
SHA1a1782c5ee319358c79df1b2123166681973d9c38
SHA25683d33525cbe68dcd1dc97e22a4395024d82995d6cce0e063323aea9268c48af4
SHA5123c6ae78cfbbb7ef54f79031aed4b5b205e4f71983ad82f327494f03a4758316890ff0734eec295f8edfdb714bc5d7ce49a95b19876faca9febcc18e943696190