Analysis
-
max time kernel
149s -
max time network
155s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
06-09-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
c58897c934ca17ecaaf87813feea17de44d42d4e9e4ec21f4d90eb184c7d9224.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
c58897c934ca17ecaaf87813feea17de44d42d4e9e4ec21f4d90eb184c7d9224.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
c58897c934ca17ecaaf87813feea17de44d42d4e9e4ec21f4d90eb184c7d9224.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
c58897c934ca17ecaaf87813feea17de44d42d4e9e4ec21f4d90eb184c7d9224.apk
-
Size
4.3MB
-
MD5
aadc03c102ad328d916341412d2d7417
-
SHA1
f8a625bf3c8400b4976f61c11c08abe3d13fa46d
-
SHA256
c58897c934ca17ecaaf87813feea17de44d42d4e9e4ec21f4d90eb184c7d9224
-
SHA512
c759102dbfa54e74633b97d20262fa9fd7e40655d1cd24ab5c92df135da90c52c932aa6f35e08e2fc0102da94df688b454c3b4304ed18f695cc15e9d437d40cd
-
SSDEEP
98304:GhbOUntjZxPy53+QfyEHDkcnEtVfA+f21/u/J3:GXRvPy53+UDkAoVLf28B3
Malware Config
Extracted
hook
http://193.3.19.233
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.rjwtfobji.qrcordwci/app_dex/classes.dex 5204 com.rjwtfobji.qrcordwci /data/user/0/com.rjwtfobji.qrcordwci/app_dex/classes.dex 5204 com.rjwtfobji.qrcordwci -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.rjwtfobji.qrcordwci Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.rjwtfobji.qrcordwci Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.rjwtfobji.qrcordwci -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.rjwtfobji.qrcordwci -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.rjwtfobji.qrcordwci -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.rjwtfobji.qrcordwci -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.rjwtfobji.qrcordwci -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rjwtfobji.qrcordwci android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rjwtfobji.qrcordwci android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rjwtfobji.qrcordwci android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rjwtfobji.qrcordwci android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rjwtfobji.qrcordwci -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.rjwtfobji.qrcordwci -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.rjwtfobji.qrcordwci -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.rjwtfobji.qrcordwci -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.rjwtfobji.qrcordwci -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.rjwtfobji.qrcordwci -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.rjwtfobji.qrcordwci -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.rjwtfobji.qrcordwci
Processes
-
com.rjwtfobji.qrcordwci1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5204
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD51f2c05d48b298777d84f88e2de7e9dc6
SHA1acef604b653c71ac4f58672f66129939e3e04aa1
SHA2562c940012ef578253c88237ebcc9dc9e1065800132589a853df4d44ebc79139c3
SHA5124ec40b17c8060433b8c794bb2f3e78e0d19dda91d2865fab41ac13aa5cc0cb4f93c7f79502c711e893b2e0a7420690b1f355a5420e8bbecba860fa1832e92ce5
-
Filesize
1.0MB
MD56149b0a9724fe3a6008709108cc4c73b
SHA13ac4c5ae607851c0ae6b6a63bd8b8490e894b628
SHA2562c7020bdcd98e13f3de2a2a4b44ec2e2917b575ddcbf2871bf3fb3bae8fa5acc
SHA5125a7102b10bf27375877126464b3e9778281432b436c44557dde0bec726330d9bd2196010f0bc6b759a0e31160e4e4ccc5b136815db37b048c171067bef8e4e92
-
Filesize
1.0MB
MD57325cf26abfe38a2315bf5a99811fe89
SHA1ba66521490d8f5b80c6c88c3c071cdd643cae244
SHA256ee3215b1df3e797e5b30cd86e30a463bb129d1f3224478d188865b4ea3d061c5
SHA512fad3d7b0eda38fa032421eb2f66377a5879608cfcefc9ae71de42f7b5f62099275dfe03750b12d1cd9f402d0d5988ba993753a2fa11f3dae48e0e7a67cd8cfb5
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD52d55a051e18af75e6c52ec2ef2b5d9c7
SHA1c936412ae9cde6e968fec5cdfbbe38b74ed44b5a
SHA256f7c7748c243e9052ebff4771abfda61857d65d1bf55a8834f765ead56604f642
SHA5120fa4d6674fcda5ce334fc181b7771af214b80640e53f1cb3e48a0bf8d0c92af53e46b9934173b37768ab59ac267294b0b45ea72942cf21b8a2f788de27939aa2
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5158513bf94d05b8efea4f35aeb111df7
SHA1be80372ae9eef42a9ff43b47e540b482aee7a369
SHA2566b83ced646286cdfed5f9f971eedfe8432dc8e0d4b3b70c83c7bfba50250e9c4
SHA5120ad0a463597b292ab264f11dd6181ca9521d0d9d70b76b1af29ad112659e76738276e4909a5093cbe0a121d1dd0ef4ed5df849442bcf37a34b2f04f15a2c1f85
-
Filesize
108KB
MD50670986f49bcf5b55e7422101aed51ab
SHA19e92f3c31f6708b2b85a4c157d875fa2665a90ec
SHA256869b651ba3e31eed3160b8bbf0983d6974e5944cc5e540cd7cd1d0e328425b89
SHA5127ac6b9039d502ec3ca33eb77ecd8662c5aaa065ad493cf9d12151d2dfc8da259391de2490ce339c1630419e453cd4c625d28ec3628f934899b9af18f9e2a5236
-
Filesize
173KB
MD57a80c4673bb50419f7157acd5b50372a
SHA11be3768e1845cb6b4fabf7bf5a940f11a7898123
SHA256fd09bed31dc9b390358aeab9d23a01e2994b0f9f8d9d2141f81acb64ed92de35
SHA51224e416b520711ff0237c7891116bdeb2f6e2f0903d2eeff715376c779222f913cf410226c4db94e07a31ec6595981e7e9fe1120601450841941efb6865673aa2