Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
08-09-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
-
Size
4.9MB
-
MD5
c4d34b47e9204f25512e78ed5c5dce4b
-
SHA1
a84a56be0168ded947018bcbb9e069d9c11ddce2
-
SHA256
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92
-
SHA512
161ebd23f3e30308cbb44c1e0db4057c5447fa103551cef1810f4504b5a4bd3d1a489704f1c8e6170d956afdf0ff48cee2eb98d3ba7b69c6f4e3c33dfe371c07
-
SSDEEP
98304:moxOqsFMFLW0SOA2lbADLDxUREtpc56u9x3G+L9v4+WkXft19:v8rFCLhSOvlUDZpcVxbL9g+5R
Malware Config
Extracted
hook
http://134.255.180.156:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.viber.voipdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.viber.voip Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.viber.voip Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.viber.voip -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.viber.voipdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.viber.voip -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.viber.voipdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.viber.voip -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.viber.voipdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.viber.voip -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.viber.voipdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.viber.voip -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.viber.voipdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.viber.voip -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.viber.voip -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.viber.voip -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.viber.voipdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.viber.voip -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.viber.voip -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process File opened for read /proc/cpuinfo com.viber.voip -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process File opened for read /proc/meminfo com.viber.voip
Processes
-
com.viber.voip1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5097
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5f2499a53443a9cafcfcaacca1575dc22
SHA1f0ba2bf45f7e114ef1770cedf6c0d3ad601c180c
SHA256fd805fa56c69788a47e54c000086714c39b3bb740c1a369e69c626c1ba8b0ade
SHA512d9ac2f9eb0ea4df2fccaa229bf7610a315776469f0f5ec021f9b292e760b1862bd086be3ac1860f384f669c83a30454301cf3432baa18a8da7b099bc3cfff9db
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD516a0aecd2406b3799b724d74311507dc
SHA19bc4438ec8d4b41a432d9b692794045f741b3d61
SHA256f3cce6c1f150a3bd491d6b2bb4ce9825db733ed228216dd98e370ca4d6cf86b7
SHA5122cb7df1a510da7a4865b35e4c59fe24287ac7324e5a875016091a2052ea9b53fe3cd20e24a3592423b011efd350abe10e70e03ce5fc41c23ea41752569c93f9d
-
Filesize
108KB
MD53ad91a0587b55733284ae0c81b1aea9e
SHA15801535e0c576d5443a50fb356823bd964a2e251
SHA25624c9c1b99cf0afec3029309d69287dbefbb639279a816943fa6bf257bf35a43c
SHA512e971b0b2e3252ba6e86514801b759f114e39b1c5f479334c8d0dc4a234de10b22de630c45f08d0a23e98b278083a9ffb4654ee41abca46250073ffff3ae88622
-
Filesize
173KB
MD5a90be1fc808d3937251dccae8404f252
SHA19394f00ce50193610c4d998b8da3cd984ecef507
SHA2569fc8290ae33e0cd53afb6b60e385d1f6c2a9292d63ba4e46f4ab3c0194049be1
SHA512b72056c19be5ab7a2dda959aa66865f8a12e5dd08bb974c80db393572b4a4f41be657f27461bfdf3f3d2e684339a3dd8e73e417abd403c96915ab624cbb67c0c