Analysis
-
max time kernel
148s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
08-09-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92.apk
-
Size
4.9MB
-
MD5
c4d34b47e9204f25512e78ed5c5dce4b
-
SHA1
a84a56be0168ded947018bcbb9e069d9c11ddce2
-
SHA256
1ea9e123831e0d35b6f66f7bd654361436aff3e337bab144b13333c660b38a92
-
SHA512
161ebd23f3e30308cbb44c1e0db4057c5447fa103551cef1810f4504b5a4bd3d1a489704f1c8e6170d956afdf0ff48cee2eb98d3ba7b69c6f4e3c33dfe371c07
-
SSDEEP
98304:moxOqsFMFLW0SOA2lbADLDxUREtpc56u9x3G+L9v4+WkXft19:v8rFCLhSOvlUDZpcVxbL9g+5R
Malware Config
Extracted
hook
http://134.255.180.156:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.viber.voipdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.viber.voip Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.viber.voip Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.viber.voip -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.viber.voipdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.viber.voip -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.viber.voipdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.viber.voip -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.viber.voipdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.viber.voip -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.viber.voipdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.viber.voip -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.viber.voipdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.viber.voip -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.viber.voipdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.viber.voip -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.viber.voip -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process File opened for read /proc/cpuinfo com.viber.voip -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.viber.voipdescription ioc process File opened for read /proc/meminfo com.viber.voip
Processes
-
com.viber.voip1⤵
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4711
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5dc9755de10c1e8fa95640d72f3aae26c
SHA15737993a0badd534ebfa87da1021cb04433e42aa
SHA2568f92bc1d247fb5e8923c9bde24a6b5135999b5a512767b477583392533b0d62d
SHA512effe433991eda9da5bc3dc11f2ad538f24d347c9a8c7a293974e67b08543d17e9462a9fc850bc90be6c12139de0bd456eb20017d625721b2f036858d3caa99d5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD53f522b1fc752309fe1946f84088c04ff
SHA1d5ee3552005e5dcc3efc1bfb5f845b368b5ebc07
SHA2560589a953b86eb66eb2d23f275a55efab4aed5f4df899be2bc2d67901a044d5ae
SHA5129b10b10adc3a9112ede1355153a7ebf56ccd697a726473dc6f72dcef4e58b31f033f5f5d525919f8d7645d63d113f94e8525ac90f32c68f389aee516bd65d3d5
-
Filesize
108KB
MD5f9deff9b5924abb564dff8d1191dd9ab
SHA1e9b4dcf48befa4cac8925d9bd0e3f75ea5bbdea3
SHA25635c08c182a39fee5c91e3ef4951b27018b69fbb8730838c92230e81418c26209
SHA5126e1de9dc8a0663698166d5bcad8a97109b7ca91e4241f1925cf951024d0f6b02e08d01f466f8b5dafd1946ec434d263f37b23aa252d9e127f95eca65a16aaf71
-
Filesize
173KB
MD57b37218894d598f7e22f5c7aee1c885b
SHA1ce2f65c5e8bdd671db9db6a700245fece9b74dd2
SHA256d66f3f8f950e9484bb725b9fe3536c4e942ed084ec44bd81cad3ac4a5468188b
SHA51249c3b00e0ee03fac8743542dc26715be35c0e1c7fbe575b2b94157275147ac93ce5a5e6fb21187534894695dfe621a63e7c3070be8e99825991a64f04f99c15d