Analysis
-
max time kernel
149s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11-09-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
-
Size
4.5MB
-
MD5
5a26d92a780058e6ee704aef167a28ec
-
SHA1
74956b5adc03b07bb0ca2785abcab3ae9633302a
-
SHA256
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548
-
SHA512
80c95b73459a2ded756b534f9fbc12b59e8ea607e9cb05e4042676f44ab2b68e6cda0c30554f5612d5cbaa649b2bd0031ed8984a8690de5a9541d7c5220e5f05
-
SSDEEP
98304:dchmGoW2bNHmu6wbB1ngCqYBGT/m6GTwyGv+Mx6k0twcVAB:dc+TbNHmvwbB1ngRYATu6nylMxbyAB
Malware Config
Extracted
hook
http://185.147.124.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
pid Process 4259 com.sxdzvbllt.ziblzjsgs -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/classes.dex 4259 com.sxdzvbllt.ziblzjsgs /data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/classes.dex 4289 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/classes.dex 4259 com.sxdzvbllt.ziblzjsgs -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sxdzvbllt.ziblzjsgs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.sxdzvbllt.ziblzjsgs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sxdzvbllt.ziblzjsgs -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.sxdzvbllt.ziblzjsgs -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.sxdzvbllt.ziblzjsgs -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.sxdzvbllt.ziblzjsgs -
Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.sxdzvbllt.ziblzjsgs -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.sxdzvbllt.ziblzjsgs -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.sxdzvbllt.ziblzjsgs -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.sxdzvbllt.ziblzjsgs -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.sxdzvbllt.ziblzjsgs -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.sxdzvbllt.ziblzjsgs
Processes
-
com.sxdzvbllt.ziblzjsgs1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4259 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4289
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD540a643c6acb1e5777f6535376e9937d4
SHA1fa0fd6f1d0485aeaad8da096021ffaf64ba3be46
SHA256d6f3687918bcc01d420b5aca521b5f35a0a5c2d0a9d698c44b32846cb0a28de6
SHA5121f0b9e8de7d91663ed59066629837c401cee5f09e6d4c144b4c3a5b1b249537e5f3ed0267508c5d34b052e461df724c387c14800e77a68d45fe34aac2bb65527
-
Filesize
1.0MB
MD59201b6aa23f9e4815c74550123a93103
SHA17e9b4871d225ebac6babe73676293f9ab9a7bd21
SHA256ee178364467665233baaa17b4f4829de9bbf30284085f4e9a9e9a80d2d5610a7
SHA5125ae8ffb201d6bec6f3b245727521419a30258f1e9f083272f75aa919582b40b1306751957f1e69d3b7fa19fb1474faa2f83b7db08d185d6bf20377eb9a23f199
-
Filesize
1.0MB
MD53b781dfd982a6d4498397c397a918168
SHA1180c7647b01fd80c48909f02f8bd28754a9ab323
SHA25695d05dd57a315d0ecf96c1f36679669522a127815aedc56e89146b81189ea0b8
SHA512df80bf589cee6da6bc8e8bf83f031c471d524fa2d4cd6143514de3f6416b70c76886e94a093f4bc6b84a3cbee7a1179547e89b4ad2b9b5549b961e4f4e5ca21c
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD51c8e4e63dd6d7f783d10de73f0321605
SHA19bb5403f4619a465f0ff5777427a5bfd1bf92c42
SHA256225077ca88c0714f17a9aa6bea38c8b8af1e29c1834b07125d89e53439d66db8
SHA512d14731b479a610fe4b3b831296c34f7e7d0f8e1eecf4ef3eb6cab8bff4a110947791df43fa93485f663f0b8ce8ad25058ee3916a32764ba7e5cefa4b7a70c0e1
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD56f39dbda6157119e24a38dfb85d1243a
SHA1520a20739063cd9402698ba9fa251512ba79a55f
SHA2563020861663fb5203ce6b0eb5b0664005ded38c01a5f5ffd7f3e08ac285c7fd7d
SHA512f7768c3375bda04cb298ae5695a9bc9c18701c5b89455d4b4a2d3812993b8238d86f63fdb1db2e6d11b1c0d05d4f94cfe5baa4ac124730f9ba98fa7881f03bb7
-
Filesize
173KB
MD52123ef0f92ca8139e95d4315d2754f37
SHA1e90b44555ef3b0f42af480532114a0cb8c16834d
SHA256295948c99311af8d695b2bfcea555b1b608b4174c0f955987035ebc73c4861be
SHA5126813c2d88235af29a58fda152a061a181ce85b446a6f9a3e3fb51b3989877ba90227a84acc2bc380a89c229b6a22f1148b16fac859343bf17b034d1f51c590bd
-
Filesize
16KB
MD55583ac0bd908ed72c1792b4a6c76584b
SHA125a2269d560a966a1818040a2215aa727037f748
SHA25661eab4ced89ffbd1ae6d8d7b12cb36e98e3f54b80b26ececb1ce20d7706b7874
SHA512da93219ae260521c96e7c0761f81b897ea84ef2665ebce6b7e02815ed541d6687ca4bf47e7f3123215ca9e385f9080f9fe8d88cc06b5de01236baa84ff04d63d
-
Filesize
2.9MB
MD57406fe62a613fd9d5107cc1d36b9bb97
SHA1451e571eefd690ac04af5d199f805ff819a2da71
SHA256952543919446e2dde7bc9cdd8882ed072a74162d2ebbdb2ce9b5355a23b52b16
SHA512e6ea47315e4ff78663ab7dc5aae3dd56d0acbb497104ad32182fb383b8497a0e299f820c7d27d51f8834b37677d225bba8a34837cedf83e5ceba72f81b10ed7c