Analysis
-
max time kernel
148s -
max time network
167s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
31-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
ebef35a1c187bc6c42783e310479c03114ccf86d1aa8edd6dd8938bebffbc4bb.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ebef35a1c187bc6c42783e310479c03114ccf86d1aa8edd6dd8938bebffbc4bb.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
ebef35a1c187bc6c42783e310479c03114ccf86d1aa8edd6dd8938bebffbc4bb.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ebef35a1c187bc6c42783e310479c03114ccf86d1aa8edd6dd8938bebffbc4bb.apk
-
Size
4.3MB
-
MD5
bd8aba4e9767ecd40c6c8c8b6bedb8dc
-
SHA1
c269a1176d94a46dfcac8dbf6a437df7218b1f49
-
SHA256
ebef35a1c187bc6c42783e310479c03114ccf86d1aa8edd6dd8938bebffbc4bb
-
SHA512
951b7b0565ef60e0f569456d329a12199883e799edc0aa8b8c78f78672e8b51a352b9d4c792fd8ada233db7cca7fb86e342bf6f9a0034e694b5227e82ac355e2
-
SSDEEP
98304:XvkQDKUon+CJ1Lf0Kc3lUSwqm1Sfdu8ibxbIdNy54Q90Hpx+:Xnxu7J1j0NVUSwafdu/bl+Y5Rkpx+
Malware Config
Extracted
hook
http://80.64.30.193
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Processes:
com.nvrfyhgnv.dpamatirapid process 4284 com.nvrfyhgnv.dpamatira -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.nvrfyhgnv.dpamatira/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nvrfyhgnv.dpamatira/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.nvrfyhgnv.dpamatira/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.nvrfyhgnv.dpamatira/app_dex/classes.dex 4284 com.nvrfyhgnv.dpamatira /data/user/0/com.nvrfyhgnv.dpamatira/app_dex/classes.dex 4315 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nvrfyhgnv.dpamatira/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.nvrfyhgnv.dpamatira/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.nvrfyhgnv.dpamatira/app_dex/classes.dex 4284 com.nvrfyhgnv.dpamatira -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.nvrfyhgnv.dpamatira Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.nvrfyhgnv.dpamatira Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.nvrfyhgnv.dpamatira -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.nvrfyhgnv.dpamatira -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.nvrfyhgnv.dpamatira -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.nvrfyhgnv.dpamatira -
Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.nvrfyhgnv.dpamatiraioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.nvrfyhgnv.dpamatira -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.nvrfyhgnv.dpamatira -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.nvrfyhgnv.dpamatira -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.nvrfyhgnv.dpamatira -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.nvrfyhgnv.dpamatira -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.nvrfyhgnv.dpamatira -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.nvrfyhgnv.dpamatira -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.nvrfyhgnv.dpamatiradescription ioc process Framework API call javax.crypto.Cipher.doFinal com.nvrfyhgnv.dpamatira
Processes
-
com.nvrfyhgnv.dpamatira1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4284 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.nvrfyhgnv.dpamatira/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.nvrfyhgnv.dpamatira/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4315
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5aa958b93f83cc2209b8724fd0e4f1529
SHA133b50f7eb182349d2945efcce8e687913c9826c2
SHA256b92fd70d5eb2706208e8b71565b3ba7097cfa6d12b31d8cce10f798bab32fe2a
SHA5122b3528fcf3089a82255ab106ed23e5633568d0b4f62a08f788bc4a42c90c6d6c56d8926820196fcd75296d350126d038ef570ad89a5c3f9767cbc3a81d8d744b
-
Filesize
1.0MB
MD5b3d80764c639f5191ea60b37e5d3fd6b
SHA1db9b4acffd15e5072f786b8cbbbca640121ef056
SHA256c2a251b5ffbc19961f524040b1bb4b55adbcc62f59bdfe2bccfb2f0a96521deb
SHA512ba9c8f74466a6e85300cee3d0d80f9d40526e586166f4053e4799e7927dfe460c7e777c34d0cffe0197aed07127f852bcef7920a89b4a9a6b1e005e27b315028
-
Filesize
1.0MB
MD5842cdd8bcedc5cadf1693d6151a7096f
SHA1ff002aae96c5721eaba558e9c2142deb6b9ecf37
SHA2561afe2e86aa781d3cc40b7a86b53c6805e93d3b74d35009f3a3b365162d01d560
SHA512dd995db6a4bb62a01198abf5f66ae6a63d07d5edfd6c6cbada1211d32425086d1be8c82ab1d4ba7b06f2c85ccf2768e4c9fe629ddb8623c6af0773ec54549c7f
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD576d65f815287bb788a1ba5dd55387c3a
SHA13e85cd2126771251697586ce7d978cbe5275a1ff
SHA2561c54ca73119d4043d1e135d09033a964eb5f91b0ed435e382ccf193a426a09ff
SHA512601d0c314f5164a1ce29c81fb6067106acae2d3bc92128b4d344fb2a931d478cb9d1c15275555180be6b8a5a54aa23533166c0ef4706d86682ddabb138817920
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5ec4b30547a6507e16df14ef7b580207f
SHA1bd2a811d7485db0720f199d541c90c4a8efd16ba
SHA256c135720b8809ab086ecb81ce49b6fbbec64b3780153fd228773ec7aa19d8bfb9
SHA512f6297f57a30df1e0ca5fc79cf8d5db071b9ea8133ae757bd444865d5d866956b84ef645b7fa32a3b7dfab7c555255ae7fcf55a605ecd83ab9d5f8071a5dc900e
-
Filesize
173KB
MD5d9ce4b50e3d9a45ca75bb82a5bbc88f5
SHA12ddee07188ed9c4a491572b6438aa99efbe1d7f5
SHA2567d25ceecf5e9d06fee1cc1c9c114d44d5a4dbd4cefc8da88d7e5400e966b3adc
SHA5124a965d24b7979dfa136b8fe4c9c772735e01ef54b3ad60c4af37209aaf19b0097a2585fd64c566ec1d28bf00ed0ee8dc29764affcc5abbf5de5dadf1fb93438a
-
Filesize
16KB
MD53fe4c7f87edd846c0261c53128978479
SHA1fc8c785a4ceea7de54e0dad64bf7789f2d70652e
SHA2566ee8f70a80e14e0fc49c6969a0da96d5560c97b649c0cc09659dd9a11800f116
SHA512f847f6e4f70b60eb13d337ab2dd73731766407f60d93e9eed4ca6d8da9560dad20604490cedf721edf686f2816a5eac52b9cd6cffb2dcf57d32c38c702888dd3
-
Filesize
2.9MB
MD578e0d4ece1de4ceb34b2a0c256a213e1
SHA1adbfee80920ebdb8644e7278d167e1b113d1194b
SHA2562fc324ab5991d78940427c17beee04e7cbd8ee23566a3ef92adee80720fb9b74
SHA512360b8fdc1f7c2e65302c131d82e2b2fb6ae6eb4b29370cf337a0858abc925f483c405b31e61fc6967d857d16d8552dc31544b5f2751930ec47db0416fed7e4f2