Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
161s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
31/08/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a.apk
-
Size
4.3MB
-
MD5
0f55133414688a8871a4ce13dbed9316
-
SHA1
0b79cce5e5ba8af04c0218544b4e8c5053cccf4d
-
SHA256
f07042eb4827bfe545baea4a0f0849f4660bf64c5d3da0cff122c807ed63411a
-
SHA512
5e479fc9eecb2111474e14546fa7b46b6a8122d6eb18380500f5078ed6b32cb46a84fd83660d55447df8157377ff93107e7c0530d3dcfe1cdc46360a612ea1f5
-
SSDEEP
98304:bbahTgujtwsCuhy2oNG8bqZrtHF3emSh+M2XUFBfdJaBpJB4YN:a2uVC0ydM8bmtUJhN2XUFBfdQBCm
Malware Config
Extracted
hook
http://149.50.108.117
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex 4650 com.mbrgitlli.hebkcgyuu /data/user/0/com.mbrgitlli.hebkcgyuu/app_dex/classes.dex 4650 com.mbrgitlli.hebkcgyuu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mbrgitlli.hebkcgyuu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mbrgitlli.hebkcgyuu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mbrgitlli.hebkcgyuu -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mbrgitlli.hebkcgyuu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mbrgitlli.hebkcgyuu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.mbrgitlli.hebkcgyuu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.mbrgitlli.hebkcgyuu -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mbrgitlli.hebkcgyuu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mbrgitlli.hebkcgyuu -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.mbrgitlli.hebkcgyuu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.mbrgitlli.hebkcgyuu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.mbrgitlli.hebkcgyuu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.mbrgitlli.hebkcgyuu
Processes
-
com.mbrgitlli.hebkcgyuu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4650
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5bb0b2d0a60ac3e96ad5430a0e7cb1b2f
SHA19897f634a80f725db24ffb7964bbba6b9cadae24
SHA2568ddd1abac262b63eae1bb7dcc6f0009647b4fe0a9b64a0bb237419d659d3bd9a
SHA512e3f7d2f956d276da56ad3d7d24a9786aeaee9c4744b00f797e3f480cca6e24a4e3021e6c1eb192d435207fd14b344701b1a885509077a093eb795009bfcfead3
-
Filesize
1.0MB
MD5d777a60f9bfcbc7c2cd0be7478291c60
SHA1d979e5b020e18b57d5c048e94935d98dfde2cf3e
SHA256c8608caa106d188838d0d33a432b157a00d66bd704ce3d0bb4c170aa5486749a
SHA512fae2bab9e71a1576b1596401a5fabf8ff8b6d5e7c1400744a8d9e0db341aec852189127596dc59e79d1580fe809ad8209cbde80157c2a20499e95bd8cc3e5c90
-
Filesize
1.0MB
MD5debf1bd82b6f9cfc87bc1e71b83d9778
SHA1786635f611dbfa8f881e0f2148be3ae142fe1206
SHA256fcd7b7e5c553c6e827e43ce5fb7ee721d61c1f1fbb30aa6ae5b5d7c3b21b3a75
SHA5128d0e255ecb65153b39123b527a6bbade8301f55a85a1435e3ce56813cca65f52f3d507c207c8ab55c39114bf4a2c9ff907fd8cae2ef7fd5e7e7c33f33e4960aa
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5d564167cc20e4a519482f37c95bf427c
SHA15386136e6b76fdaf0ba9e581412f78b2975e2707
SHA256b3f7ca0d584edf1c7cda125a5c9334e9f4734dad22727df99c13902ed0b4b4c8
SHA512646198bab6481e1fb6d2b126997cdc1e100e297c65473e72a3d519ad9d8e409cfb6e272a73f2989c5d47b58fe206460cc0517e512a3dc3c3a1b8cfeaf773fffd
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5965eafab05967564a762e9e50b70d1be
SHA16a7aa20e9d593537b909195272e29b588ea7297f
SHA256686498b610f180ff5e5a6d2532ef338385acefb9642cba0fb5dbe027b4bf94dd
SHA5129c8203e779a99ea80f36c2479ca3d04f0139a6684a785536890d50b54c4125fb90250c3b41d82b834862180858a5c0e70ee49520ef87e76970d45ca5f40087d7
-
Filesize
108KB
MD5dc9a2d0ce2b78dc58ea3fcfd13225ef0
SHA133e49d370688ce824f3b1f75a562ac3c8a0719c8
SHA256a29dbb33a2eaa0ec3cd7d28b829db8333fa5a203c07ff0c48c281a0c4b208ed3
SHA5122b39e64ea4069f3b39bfd3b122717681292016be9701d40d573c79a5f43eed4176301a56e756c0b2d93c35ae7fa507945d7057d795c020acfe10cbda7cc978ba
-
Filesize
173KB
MD5603c07f276abb3d74a92c04c93600c27
SHA1090c2c1282fd562330c14ab93e165af7166641f3
SHA256d37ef212cffb0682439e652192facb46d81ca8905634e5cf88a31e1e708a453b
SHA512d16fff4cc7c0f71eca75d3d96da20c858f04df0081a8dd441272727d952139e0c9182ff3eed02147e33496b109664f488bcad8cacbeb845b2b781b98471aaf7b