Analysis
-
max time kernel
149s -
max time network
154s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
10-09-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
d94c773a579344b61c8d94438676562228e1b08395052059887662b45d3668bb.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d94c773a579344b61c8d94438676562228e1b08395052059887662b45d3668bb.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d94c773a579344b61c8d94438676562228e1b08395052059887662b45d3668bb.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d94c773a579344b61c8d94438676562228e1b08395052059887662b45d3668bb.apk
-
Size
4.4MB
-
MD5
43557157e3cdccd8aaf6c6d174fd0041
-
SHA1
ab137b43bf558e2fde846cb6bb6513f70f5abaaf
-
SHA256
d94c773a579344b61c8d94438676562228e1b08395052059887662b45d3668bb
-
SHA512
0268cf59631bac39ac09849b432e2fd95ea542d72e14b5bf7b2723254e52101d3138c28aff024e628fd92c0012ff970775cb5f10d466eaffff8d949ab1e7c41a
-
SSDEEP
98304:Ab/DkuEew9l5VbgXoabHULNItkgfps4Q7DASBvVjeZjqYYdHzD4PzrW3E:Abb/ET7bgXvb0LNkkoQ7DASBviAHzDqF
Malware Config
Extracted
hook
http://185.147.124.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.inpcirazx.epycjkjfi/app_dex/classes.dex 4776 com.inpcirazx.epycjkjfi /data/user/0/com.inpcirazx.epycjkjfi/app_dex/classes.dex 4776 com.inpcirazx.epycjkjfi -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.inpcirazx.epycjkjfi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.inpcirazx.epycjkjfi Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.inpcirazx.epycjkjfi -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.inpcirazx.epycjkjfi -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.inpcirazx.epycjkjfi -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.inpcirazx.epycjkjfi -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.inpcirazx.epycjkjfi -
Performs UI accessibility actions on behalf of the user 1 TTPs 17 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.inpcirazx.epycjkjfi -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.inpcirazx.epycjkjfi -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.inpcirazx.epycjkjfi -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.inpcirazx.epycjkjfi -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.inpcirazx.epycjkjfi -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.inpcirazx.epycjkjfi -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.inpcirazx.epycjkjfi
Processes
-
com.inpcirazx.epycjkjfi1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4776
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5ea6d3d9c6778fc5cad405546496a13f2
SHA155db3711b59c12d7fb08279787f7bf2a1c1adc59
SHA25677da31192a4f3eadb0e3c8775142a047be944f93b26d557122f9647bfe7036df
SHA512791ccf48a5f7e0f4f7e972bd77e5ad3ec8ed16860f4410ec52d353047777354a8dfc25a5287812349ea3756559202d4dad80b4e09cd8d39beccfc19d33babf14
-
Filesize
1.0MB
MD5e734cc59b28440007fc220beb992a647
SHA10c762ea03f99e74cd99872de6d52408986bb080f
SHA256aa7f1278fd8c40d7970fe4dd905c2c3ead1ed8d98fd0f8c58cd867c46b3ef12e
SHA51277fb8b9fbbcd102c37ca554ff6e53c32db5191ec7a2751acaadd0a2797745d76fefc7693a9c49ebf708f436a295ca659a03bd8acc8534f35299c9f453e25c8d2
-
Filesize
1.0MB
MD5e700fd879a304410370409f8ea1358a4
SHA14debe36321aa090564529d5162f04e866f86ef7a
SHA256d0063c32ddf79bd5f75793d25c049aa5a12863fdf6a4b98fc8e79429bfa26a39
SHA5121324d36f4133540fad1699096f78110c46cdb4d2f24fcaac517e87571ade7c3d7a3908cd022a97cb9dc9db0e460b02a266d51213b5e34b9e2e1403b79b9551c7
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD59b5aad021a47a27c41e3c68eb1438c75
SHA1dc8598d6d37960e02f1648bd750073b7da235d43
SHA2561470f92ed2df10cfa475336f9469ade6e740377ad25ecb20438f0fe67e2fad1f
SHA5122c27d03203e7c8bccd1e808b98340ca14f81da2d152bd0bbcde3d9d88499ac3ba62a7681b3b0a950baf6c6e58a3e8de7ef7853416c7c2966ad237e5f514fc99b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD55a6313696b60cc459182f92cc8acb6e0
SHA1b551598877251903dcfd13dd5bba9246df728542
SHA256c414f45aa36c7cff78fdbb7af61941801e38cefc6557b66b5b2054dd0280f92c
SHA512a9686c2e041f1ed59a1054fd6fcb3f0f5c68b6cafc64538da58143cf6c78d874ec4d5faceb7222403e48a8ff34f5390c265be4eb8ab5ba3fb71b8cd4d04e3b67
-
Filesize
108KB
MD5e6e430121b1a75ae7918fd2432dc404e
SHA1acc7f74ada588fce4f5a47f172c6700ca15dd8b1
SHA25611ffc8b87ef533dc752651050fc189ea9fde48dcd395bde841451703c3064def
SHA512b9d71c242822537c45a2cf963437df7f597bacf6be91623b6bece6f0354238813d33424dde05f753fe0d45eaf22eec30a5630d933870cd63e5cd53429699dc0c
-
Filesize
173KB
MD545ecbae0a873870a84e76e3ea1dbee12
SHA190ef5e77ada9a79db6fad06dac4a0971bf551985
SHA25691f5523b8f517ba69b14a589f8ada5d6c405b2dfb0caf1c57553b12cc3c01459
SHA5125218201a0abe6e39355011e5f5084f22e4d13b396b981e58203cc1a4d0af5b260003701a229063b9ae9b800f9f24471210a17e8c95b50bbe3677ae86c95dfdde