Analysis
-
max time kernel
147s -
max time network
168s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
31-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
-
Size
4.3MB
-
MD5
0f55133414688a8871a4ce13dbed9316
-
SHA1
0b79cce5e5ba8af04c0218544b4e8c5053cccf4d
-
SHA256
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a
-
SHA512
5e479fc9eecb2111474e14546fa7b46b6a8122d6eb18380500f5078ed6b32cb46a84fd83660d55447df8157377ff93107e7c0530d3dcfe1cdc46360a612ea1f5
-
SSDEEP
98304:bbahTgujtwsCuhy2oNG8bqZrtHF3emSh+M2XUFBfdJaBpJB4YN:a2uVC0ydM8bmtUJhN2XUFBfdQBCm
Malware Config
Extracted
hook
http://149.50.108.117
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex 5077 com.mbrgitlli.hebkcgyuu /data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex 5077 com.mbrgitlli.hebkcgyuu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mbrgitlli.hebkcgyuu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mbrgitlli.hebkcgyuu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mbrgitlli.hebkcgyuu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mbrgitlli.hebkcgyuu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mbrgitlli.hebkcgyuu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mbrgitlli.hebkcgyuu -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mbrgitlli.hebkcgyuu -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.mbrgitlli.hebkcgyuu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mbrgitlli.hebkcgyuu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mbrgitlli.hebkcgyuu
Processes
-
com.mbrgitlli.hebkcgyuu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:5077
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5bb0b2d0a60ac3e96ad5430a0e7cb1b2f
SHA19897f634a80f725db24ffb7964bbba6b9cadae24
SHA2568ddd1abac262b63eae1bb7dcc6f0009647b4fe0a9b64a0bb237419d659d3bd9a
SHA512e3f7d2f956d276da56ad3d7d24a9786aeaee9c4744b00f797e3f480cca6e24a4e3021e6c1eb192d435207fd14b344701b1a885509077a093eb795009bfcfead3
-
Filesize
1.0MB
MD5d777a60f9bfcbc7c2cd0be7478291c60
SHA1d979e5b020e18b57d5c048e94935d98dfde2cf3e
SHA256c8608caa106d188838d0d33a432b157a00d66bd704ce3d0bb4c170aa5486749a
SHA512fae2bab9e71a1576b1596401a5fabf8ff8b6d5e7c1400744a8d9e0db341aec852189127596dc59e79d1580fe809ad8209cbde80157c2a20499e95bd8cc3e5c90
-
Filesize
1.0MB
MD5debf1bd82b6f9cfc87bc1e71b83d9778
SHA1786635f611dbfa8f881e0f2148be3ae142fe1206
SHA256fcd7b7e5c553c6e827e43ce5fb7ee721d61c1f1fbb30aa6ae5b5d7c3b21b3a75
SHA5128d0e255ecb65153b39123b527a6bbade8301f55a85a1435e3ce56813cca65f52f3d507c207c8ab55c39114bf4a2c9ff907fd8cae2ef7fd5e7e7c33f33e4960aa
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5632bea32395abc4fbc81eafc54aabdcb
SHA1437d06bb7230f50f8a83fc304eb8524b74241425
SHA2566d7fc111452595fe8250a83db877028c0ee27fb6d2b0f0de64dd1ac786c35496
SHA51270085571346246bfb22d0dceed16b9947146e503d15d93e2069dca932ee9ec7c492c966f13624ad023d8aa7012185bbceecf63d3f6228864c6d96b4bf44de593
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5a9ce7f739ab6f0d698369dbacf15d650
SHA15e03cba092809eff46fb711a0974e39957214c84
SHA256d386313663c24cd52cc74c40f69b20e5cfeefe757005f36dec6ac0c4e03d8cfc
SHA5128de3e634a3e371461b68b8e7739fb12c23e52342202d27aab4401e646751d14755a28fc5f5ad1484ff91e1dbb89598313054ee86e0f55344098efbfb38b53c20
-
Filesize
108KB
MD544509b5768bdd8dc4b2d5a0a14005993
SHA198447ddaece84b5793158deca6e0b4ff3d355950
SHA256fc836f789c50cb278e50a4a290f0670804989d6bb84ffb9042232300518fa306
SHA51264c7511b45607b802fdfe17f30cadfdd74d3ad6cbb780ca0fc912aa25f45d7f5b33ccce7df457db1ac95615d69d08f9cefd2b6f8000a078e279e5e06583327d8
-
Filesize
173KB
MD56d721d0b860db498e74adf05c49bb2d8
SHA199f2768313a9cd6e3c23ca1c9c2b34da0aeaea8e
SHA256c92396819eaf2418be62c604849c6ace4c3b5184010d5a766e4a32ad60c54b9c
SHA5120cdc346e84024ad932a2b3234f87c1bf037dc072e047aa158e6d502e813095ddabdaf90906428fe02bd802a1d930a86073b5341c251cdd3f1910bf103e50370d