Analysis
-
max time kernel
148s -
max time network
153s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
09-09-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318.apk
-
Size
4.2MB
-
MD5
8a52ebfaf7f83173190be087c3321eed
-
SHA1
89ca74dbd4b1fea4f5a121eac91841e91bc60578
-
SHA256
8757261be437927bbb7f0cc23381061311c407e81abb6ded542faa43a12c5318
-
SHA512
358f0938171f8baec1ccf3b68a7eecc9df273dbe354be7753f4b231364ed1b8b0a427d49b1b2ede11c293e6c357aff3f7c996f71dbd3245199ad639e6b481190
-
SSDEEP
98304:ZIuZdTM+JlZedlo5NFYEWEeDh2u20Z1WpfsbPQtaThWH:Zk+JlZGloLJ22uzrJQgK
Malware Config
Extracted
hook
http://134.255.180.156
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cowwkzbki.musaufvfwioc pid process /data/user/0/com.cowwkzbki.musaufvfw/app_dex/classes.dex 4771 com.cowwkzbki.musaufvfw /data/user/0/com.cowwkzbki.musaufvfw/app_dex/classes.dex 4771 com.cowwkzbki.musaufvfw -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cowwkzbki.musaufvfw Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.cowwkzbki.musaufvfw Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cowwkzbki.musaufvfw -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.cowwkzbki.musaufvfw -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.cowwkzbki.musaufvfw -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.cowwkzbki.musaufvfw -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.cowwkzbki.musaufvfw -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.cowwkzbki.musaufvfwioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cowwkzbki.musaufvfw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cowwkzbki.musaufvfw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cowwkzbki.musaufvfw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cowwkzbki.musaufvfw android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.cowwkzbki.musaufvfw -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cowwkzbki.musaufvfw -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.cowwkzbki.musaufvfw -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.cowwkzbki.musaufvfwdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.cowwkzbki.musaufvfw -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.cowwkzbki.musaufvfwdescription ioc process File opened for read /proc/cpuinfo com.cowwkzbki.musaufvfw -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.cowwkzbki.musaufvfwdescription ioc process File opened for read /proc/meminfo com.cowwkzbki.musaufvfw
Processes
-
com.cowwkzbki.musaufvfw1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4771
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5e121e7c17186aaaed8fa5378a1aae1ee
SHA19e0482e0f3a29147bc5f033c54d0e29045e940d6
SHA2568c9a97d26c4881f3ffda54f5a2120dd70f854a37b829f8a13a018a1fa2aacd27
SHA51252fd3750fd4a90abfb77804ba7e652dfd6a1302cb981a7cdaaac194e2836a228237a76909a1407f0394512471b3c6509009954cc9950ed82f68141b22bf43cb0
-
Filesize
1.0MB
MD53fc088e1357b927bcdaa95d749402456
SHA11484a488333ff4b8f999f9c30e3221fa3be8fc91
SHA2562f5b98535cea266646da75921f489166c91774a44aea469361a47b0a9dc8de73
SHA5120af08682bc3d0987c6ba074fc4894c2854dcec99f8b6f8ed9f3f16d0d374823955da3434f1ef6395bbb1c37f16d75fc63c59c1fd14d2917d929e3b9f32447b79
-
Filesize
1.0MB
MD50984297e37da6c17d5270fd7e682347b
SHA1f3f2d6009895eae8aebad8b5ec995ce55fe3aa82
SHA25697e0b2417853ac66f387a4e3b6b4c641b6aa984bd6cc19b20b11f85117214728
SHA51285a3997f4bf61205e434eed5a6e4faffbb2e16097136911070186b480614d84cf8007f040fe2328c1b18a146c840ed552a64006ac8bea6ea4c40b543d3dd3db5
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD56da3562b017a4cdc0ef26c9f27c9a092
SHA10f9bd997f172759f973b42ff7957e02b62948c97
SHA25674ce370bfd3c6e24a85b3bdd34c7f018a92ddf0ea92f607015b4ecab04c3bf0c
SHA5128a3606031d359a9ad9661789c1f7396b1e698b5e510f7f551907293335f05264172b08b7c0253a51be18f79bff1cc4a9d507ae07e828db172ea8aebce6baf5ce
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5b29d953abaa8941e5617686b8411794a
SHA10d247df5f4ff8f09e78c6ee202f8f38cd1ab2366
SHA2564f3fbe3f1a01e51b81aba2d7b91a59efbb9993564de9ccb5e08031df2fa26fb3
SHA5121518f2681310312f18924297a0866ebe3889bb6c607ff3863279bc130991881cebaf94c9dc2e589355b0bed06d2bd5bba370760bbf69e7818c512533cbd7a812
-
Filesize
108KB
MD56dd35ead847835297eb57273dd63f309
SHA1c3dc32f804f0e114b228c7130dc4ea339c745ca9
SHA2561080517d50857c5e232b896cbca2905e49b893a19485b0f9157c0c50d533194c
SHA51291fc226aa7100a458051f9e0cc0558eaca0accb2195800b904a8e50e5e71c98bba10a84b3c5339dd3857b7843fb78f2de0cc7c83ee4ceeccad20a65b150ce319
-
Filesize
173KB
MD58e5e2e777ed9b70bc390927a00c70fa9
SHA176775a56e2e4a922e2f3d1a5532dbd40ba9b726c
SHA2568780e3e38b998494a2ad8c64595ce9b3bfcf7d4faf9f4060f59b193350bc0cf2
SHA512208ffe0f94d381e3d04ee3c48315f40389d6f05f30b2c2f71111a4677fe71a20199c63f7aef56271b09f0cdd4c6e2f1a7179cae46768cc6ddfdd3e59f49185b0