Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
165s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
31/08/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
-
Size
4.3MB
-
MD5
0f55133414688a8871a4ce13dbed9316
-
SHA1
0b79cce5e5ba8af04c0218544b4e8c5053cccf4d
-
SHA256
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a
-
SHA512
5e479fc9eecb2111474e14546fa7b46b6a8122d6eb18380500f5078ed6b32cb46a84fd83660d55447df8157377ff93107e7c0530d3dcfe1cdc46360a612ea1f5
-
SSDEEP
98304:bbahTgujtwsCuhy2oNG8bqZrtHF3emSh+M2XUFBfdJaBpJB4YN:a2uVC0ydM8bmtUJhN2XUFBfdQBCm
Malware Config
Extracted
hook
http://149.50.108.117
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
pid Process 4265 com.mbrgitlli.hebkcgyuu -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex 4265 com.mbrgitlli.hebkcgyuu /data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex 4297 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex 4265 com.mbrgitlli.hebkcgyuu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mbrgitlli.hebkcgyuu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mbrgitlli.hebkcgyuu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mbrgitlli.hebkcgyuu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mbrgitlli.hebkcgyuu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mbrgitlli.hebkcgyuu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mbrgitlli.hebkcgyuu -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mbrgitlli.hebkcgyuu -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.mbrgitlli.hebkcgyuu -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mbrgitlli.hebkcgyuu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mbrgitlli.hebkcgyuu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mbrgitlli.hebkcgyuu
Processes
-
com.mbrgitlli.hebkcgyuu1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4265 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4297
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5bb0b2d0a60ac3e96ad5430a0e7cb1b2f
SHA19897f634a80f725db24ffb7964bbba6b9cadae24
SHA2568ddd1abac262b63eae1bb7dcc6f0009647b4fe0a9b64a0bb237419d659d3bd9a
SHA512e3f7d2f956d276da56ad3d7d24a9786aeaee9c4744b00f797e3f480cca6e24a4e3021e6c1eb192d435207fd14b344701b1a885509077a093eb795009bfcfead3
-
Filesize
1.0MB
MD5d777a60f9bfcbc7c2cd0be7478291c60
SHA1d979e5b020e18b57d5c048e94935d98dfde2cf3e
SHA256c8608caa106d188838d0d33a432b157a00d66bd704ce3d0bb4c170aa5486749a
SHA512fae2bab9e71a1576b1596401a5fabf8ff8b6d5e7c1400744a8d9e0db341aec852189127596dc59e79d1580fe809ad8209cbde80157c2a20499e95bd8cc3e5c90
-
Filesize
1.0MB
MD5debf1bd82b6f9cfc87bc1e71b83d9778
SHA1786635f611dbfa8f881e0f2148be3ae142fe1206
SHA256fcd7b7e5c553c6e827e43ce5fb7ee721d61c1f1fbb30aa6ae5b5d7c3b21b3a75
SHA5128d0e255ecb65153b39123b527a6bbade8301f55a85a1435e3ce56813cca65f52f3d507c207c8ab55c39114bf4a2c9ff907fd8cae2ef7fd5e7e7c33f33e4960aa
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5f858426365576d638fb2272010ac90d8
SHA167bf84a67ab1c329283cedc48613413de0e4a741
SHA256133679a69811bb9353babacd3facdcb2ef805716a34b2751931fda8baac3c1b0
SHA512feae3c92d7b0833109f7d875c239f90a4776afdc3c64d33c23cfa9a8cc5b5e9394bc41f62408c5bf0c9f5d117e59d0c9f9f917c80dd5395e36d579d0743cbb8f
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD54788e1145d4b87b7fd4d9a43b0c02df2
SHA1eb6788f4c5fff18464947108e9ab9bc129327132
SHA256b2b7bd440a02af2fc2ee7d7c11ed33a8062da40433af9fcb261e08dd6a770135
SHA512d0add608ac119d17ce23bb86416b02ef14b16fb18bc0408af56a31ad96eb90dc1b3387eb499849d5a1714cd739d48055be00da04f977319a4bab73de552eeb18
-
Filesize
173KB
MD5edc4d123ff13aa0d379df28fb40f89ca
SHA1d3cb2424197bb9b8e636557b84dd8bce38826473
SHA2561ba381297c72db5b64063098ff9d4ae075278d290b73b3cc708f627e3ec741fe
SHA512bcd62eca1be16b344fefb3b7e43d2017fe83ad185642647fd9dbd80ae8a28db539f6acd1269906b1c13122765beed4bed0f96e0c79401a73865a1c34827d0e2e
-
Filesize
16KB
MD541fb58549c0b46a311499d83e2ff3758
SHA102168828f0a71dbcb2b338f78310609fc3b7e988
SHA2563e6c732b4df26a6896968f8712fd766f31918fc18afff1ee03ff9a4e6d9a013d
SHA512972dd06edff780ae2b737323f040e8cc281b756c877a60e3775f1f4025af8f8e958a408b8264ff69f6d475fa11a5e3d945fe8b84165bad886b85683d42606fd5
-
Filesize
2.9MB
MD5c2ad4df978003cad2ef681f86c002154
SHA14ae1db25881cca9c838497003a555bee785f02ce
SHA256260554036fa9c620e41f7ffdba7b37f0a0bb862f2cb99a75ebc0e39da0817641
SHA512245afbde96ac0bb409e74768c2e585a70a513c5814eef7b2d5eb85274973858389099839f9bb2bba4a4960519e54520ea08e78068c088e8d79e300251ba6b42a