Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
10-09-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
4c9fe558e596df0a71a6bb81951ed0e168969a6abad2577a2e852b2431eb3433.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
4c9fe558e596df0a71a6bb81951ed0e168969a6abad2577a2e852b2431eb3433.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4c9fe558e596df0a71a6bb81951ed0e168969a6abad2577a2e852b2431eb3433.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
4c9fe558e596df0a71a6bb81951ed0e168969a6abad2577a2e852b2431eb3433.apk
-
Size
4.5MB
-
MD5
650efe508156f66adae704c3131c77a9
-
SHA1
ccda853f114d70e0466bc6d05a72be09c4a8fcd5
-
SHA256
4c9fe558e596df0a71a6bb81951ed0e168969a6abad2577a2e852b2431eb3433
-
SHA512
2077d663a552e260ac5f8a2d86cd08fad654463d70e95f850ed16a7b2d3c66d078d9e6520a92aa9b484e80b9789f4e0a819adb2bb8b03e2cfa00f7f87ccba57a
-
SSDEEP
98304:jx9/BJbPgBtQ7ab9GRGH0u9YQmEMOooHKC0ZtZj:jx9/Hsjnb9GwHZ9YQmElLKtZX
Malware Config
Extracted
hook
http://185.147.124.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.pdddfqmrs.mmmpnvgbl/app_dex/classes.dex 4335 com.pdddfqmrs.mmmpnvgbl /data/user/0/com.pdddfqmrs.mmmpnvgbl/app_dex/classes.dex 4360 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pdddfqmrs.mmmpnvgbl/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.pdddfqmrs.mmmpnvgbl/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.pdddfqmrs.mmmpnvgbl/app_dex/classes.dex 4335 com.pdddfqmrs.mmmpnvgbl -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.pdddfqmrs.mmmpnvgbl Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.pdddfqmrs.mmmpnvgbl Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.pdddfqmrs.mmmpnvgbl -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.pdddfqmrs.mmmpnvgbl -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.pdddfqmrs.mmmpnvgbl -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.pdddfqmrs.mmmpnvgbl -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.pdddfqmrs.mmmpnvgbl -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.pdddfqmrs.mmmpnvgbl -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.pdddfqmrs.mmmpnvgbl -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.pdddfqmrs.mmmpnvgbl -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.pdddfqmrs.mmmpnvgbl -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.pdddfqmrs.mmmpnvgbl -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.pdddfqmrs.mmmpnvgbl -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.pdddfqmrs.mmmpnvgbl -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.pdddfqmrs.mmmpnvgbl
Processes
-
com.pdddfqmrs.mmmpnvgbl1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4335 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.pdddfqmrs.mmmpnvgbl/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.pdddfqmrs.mmmpnvgbl/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4360
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5598789e4e46eb5bf31dc6a31e390e149
SHA1f5bf17bc80ea19547b222b74af503bfe5505cc0a
SHA25628fd7a5cd9fc1d1f22cd545256548026162972a10caa03cd61c3f89472686760
SHA5123c3c8c4ead3d932465faf336062a4b95ffffc3da0f9b17a86a7ea60c349fd3b6cc7f113ea3ace43445a32fe60888eaba1c568993bdd0d4896f409b2ab75da02f
-
Filesize
1.0MB
MD533f15fe6dca8a3adac1d6f601e3cad6e
SHA1f51682b4cc0fe6ac09c63669080503c82981de8f
SHA256b839b39e82f51a44c7611e3eeca8c0324d1a67aba2631d46592afda0241af178
SHA512b5d3df70f335bab92fb87cb66c40dd6d8dd0af240626c81e641be2c1755358c855fd8cb0247edd9636ad645f1dde1d49ccf4878ee500124ef98eb9bd7ba7a7ec
-
Filesize
1.0MB
MD5f73123d23133e64e151d263d882115a4
SHA156352449c0016138fbc9030bc6d12c8c60a31103
SHA256ffa16e816e00e559b0b6ff33e4bcd83b12c184c18a43e3fca49c79c5669c5c32
SHA512b4ad5a9a28c15d224c1e254eb0047d46bdb8cc29e40cf610410fe5c2fabec8c8978ec20901c7ea604a075553c05d3e0305d8a0dc098da6aff632788da351bd1d
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5b3b012d9b9a1b41abfb55ed4b0c881c7
SHA171b9a3ec2799b0116a6ce678e00a353564efb6fb
SHA2560ec211da9de889b295e82c0281ecb12deabc032abb13a199fdb7e315b6c42eae
SHA512c4bd2d9a49b9a804acd4e9b1801585c036c4799a4c6cd9181ef697df06477f9c9f45a87ee816ea6a377816603d8a37475fa1302f11cf1d1255c6d2169faebe00
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5f6d490fad95e39c42ef8a3a30bf40730
SHA1e3181c0e826b8a0b02de3bfe8ef80077368ec6ab
SHA25674577d0a5d81f063ae41dd3c81458667f600236d13ee74a8d76fe867c3d3d109
SHA512569aa12150b7e87d9bf328251a175ae6bee49a477663acc526b4d6863c88d8056046f0ee5a7e4772f50d9cc6f08172589732e38345f33aebf9235dc5f6745c1a
-
Filesize
173KB
MD520b7868e4bfdf11f9c178e75bf0b67a1
SHA188742d8c792104b52406332e01684a93f99faddd
SHA256e9a1cf8a4e00761b0328a297bffe3b42ab10b6b705655a388028747a6f5ceb2f
SHA5128bbc30a33bf81c3107eb8c7d3c6ba808d178b2cccf317b483091957ed2ae96b5400730b4b90b221fe5bbcf1cd59f5b3cebffc400ebe6be8fe591e9dfeeeb95d5
-
Filesize
16KB
MD507eaaaddf4a76c22df38b630a5b43caa
SHA1449a1cf64717afc9ea93e9634e50b211639b77d1
SHA25681af48aceb438e9609d33b5e6d18d3bd06110ab7efa81e0d0353ac21240e7a7b
SHA512de6c1f685b0efaeb3f183ef70412a2320ea035110eb14ced126e36eca899db3674113f50904352d45e3a7515fa6443375e84a165f2ab3f7c17424c07d2f38993
-
Filesize
2.9MB
MD59f7e5366b4f344c126bb9e55b8f626c2
SHA1b65d6f6a2a2606939d7f898c7774334ec6c93fe4
SHA2566a04bd0d99c9b8be83f2427c77249c4eab3034e2b45c0cb69cf046948be62169
SHA512cad683e97ee1465e8f3e15744ec6d025c5d98c842086cca30e538e3cbe36d6363a583c014dbf676c6cfdce806fb4d08575af03ac6867f95114cab0722933f71c