Analysis
-
max time kernel
149s -
max time network
162s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
31-08-2024 22:04
Behavioral task
behavioral1
Sample
dd5c43dcdfab10ebe1b2ec29d46923e2364e420b64fb6218b8d9296ab7b5145c.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
dd5c43dcdfab10ebe1b2ec29d46923e2364e420b64fb6218b8d9296ab7b5145c.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
dd5c43dcdfab10ebe1b2ec29d46923e2364e420b64fb6218b8d9296ab7b5145c.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
dd5c43dcdfab10ebe1b2ec29d46923e2364e420b64fb6218b8d9296ab7b5145c.apk
-
Size
1.6MB
-
MD5
e15d2fa068546bba8480dc2079615cb9
-
SHA1
907e12012a311fdbf34b437bf7a665f8aa0f28ae
-
SHA256
dd5c43dcdfab10ebe1b2ec29d46923e2364e420b64fb6218b8d9296ab7b5145c
-
SHA512
65eb4398b2f002f3ce566d1027717728159cd7077825a4ad7db2df14826949363a420ca029d6a9de62c7f7a1f7a3619a47594fc5435e18e9caf8f0301401a2a4
-
SSDEEP
49152:Yg/YK5VBg+Pbjyw+zLy850DTlPeGTgLTz7Eksy:vd7PbOzLpGDkX3z7tJ
Malware Config
Extracted
hook
http://149.50.108.156:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
pid Process 5113 com.google.android.apps.translate -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.google.android.apps.translate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.google.android.apps.translate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.google.android.apps.translate -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.google.android.apps.translate -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.google.android.apps.translate -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.google.android.apps.translate -
Performs UI accessibility actions on behalf of the user 1 TTPs 4 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.google.android.apps.translate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.google.android.apps.translate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.google.android.apps.translate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.google.android.apps.translate -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.google.android.apps.translate -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.google.android.apps.translate -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.google.android.apps.translate -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.google.android.apps.translate -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.google.android.apps.translate -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.google.android.apps.translate -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.google.android.apps.translate
Processes
-
com.google.android.apps.translate1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5113
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5081e465c94361b56a1cd5374bbb981f7
SHA1a4448753549f78828f028495c1c6409b011e88f7
SHA256408f64616fc27d5284dce1f6d533b4cb6cc9274d82736d221b1765df6671f4ec
SHA512dca901f7e4c8a0abf0cb69ee56f53990e27373bb004f36e391c7385a3041801748f3694aa7c86a4e16d3076f8f8b22596129b6b9bb0f0a3f9f46ff12215973f1
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD503129406c0581f929ee9df69264fe8c2
SHA1625f044f6e3888fb976160f8711e77a04cef792d
SHA25648619defcb849701d8d3a3038606d3d1248575fc01a1ccdb21adc868bdcccd07
SHA5127755247e9f2b5eecada450eecafd405a7a9affec982b3a393647e42804e50c77b1c04926a21b8b60c77f0c205f3f34b4881c817cd3ce36fe9082d5c36e228f42
-
Filesize
112KB
MD5adc73e5b6ec937d13e0262b35abd648f
SHA14d195d36b09d07e8cc9c30e22978811a228f24eb
SHA2565cbb9e44af9ca20263d180b4d0f095b3e999fc70085884ef0434d6133cac183a
SHA51275af2317b3a4fb61248f95e0a7df56aa45322675b9e1d40359b5795905fb9494137d1cb7b52dd604ee5b58c2b461d63b519def45a243797839d387675e76c88c
-
Filesize
185KB
MD57187942917fde77f10a0f990d0337a3a
SHA1706f58e928f4804ac09f3032a1b6a06169069d60
SHA2567c6ee8ea373b90c2b5f4e231d30bb5b418e44c5e09ebdf8f1249970398f0867b
SHA512bce1c94ad33aced58b448863dab44ead7c7e0f55a38d2aeb90cc975ca5fa81db066d1d18cf22df2235e6b12a9854ad235c93cb9c83734cdaaf69e12e6857d92c