Analysis
-
max time kernel
138s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-09-2024 22:11
Static task
static1
Behavioral task
behavioral1
Sample
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548.apk
-
Size
4.5MB
-
MD5
5a26d92a780058e6ee704aef167a28ec
-
SHA1
74956b5adc03b07bb0ca2785abcab3ae9633302a
-
SHA256
98cf7a5229066b439c603598873f3d662c088382a84cb3ba36fdc28024255548
-
SHA512
80c95b73459a2ded756b534f9fbc12b59e8ea607e9cb05e4042676f44ab2b68e6cda0c30554f5612d5cbaa649b2bd0031ed8984a8690de5a9541d7c5220e5f05
-
SSDEEP
98304:dchmGoW2bNHmu6wbB1ngCqYBGT/m6GTwyGv+Mx6k0twcVAB:dc+TbNHmvwbB1ngRYATu6nylMxbyAB
Malware Config
Extracted
hook
http://185.147.124.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.sxdzvbllt.ziblzjsgsioc pid process /data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/classes.dex 4967 com.sxdzvbllt.ziblzjsgs /data/user/0/com.sxdzvbllt.ziblzjsgs/app_dex/classes.dex 4967 com.sxdzvbllt.ziblzjsgs -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.sxdzvbllt.ziblzjsgs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.sxdzvbllt.ziblzjsgs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.sxdzvbllt.ziblzjsgs -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.sxdzvbllt.ziblzjsgs -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.sxdzvbllt.ziblzjsgs -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.sxdzvbllt.ziblzjsgs -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.sxdzvbllt.ziblzjsgs -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.sxdzvbllt.ziblzjsgsioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.sxdzvbllt.ziblzjsgs -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.sxdzvbllt.ziblzjsgs -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.sxdzvbllt.ziblzjsgs -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.sxdzvbllt.ziblzjsgs -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.sxdzvbllt.ziblzjsgs -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.sxdzvbllt.ziblzjsgs -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process File opened for read /proc/cpuinfo com.sxdzvbllt.ziblzjsgs -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.sxdzvbllt.ziblzjsgsdescription ioc process File opened for read /proc/meminfo com.sxdzvbllt.ziblzjsgs
Processes
-
com.sxdzvbllt.ziblzjsgs1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4967
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD540a643c6acb1e5777f6535376e9937d4
SHA1fa0fd6f1d0485aeaad8da096021ffaf64ba3be46
SHA256d6f3687918bcc01d420b5aca521b5f35a0a5c2d0a9d698c44b32846cb0a28de6
SHA5121f0b9e8de7d91663ed59066629837c401cee5f09e6d4c144b4c3a5b1b249537e5f3ed0267508c5d34b052e461df724c387c14800e77a68d45fe34aac2bb65527
-
Filesize
1.0MB
MD59201b6aa23f9e4815c74550123a93103
SHA17e9b4871d225ebac6babe73676293f9ab9a7bd21
SHA256ee178364467665233baaa17b4f4829de9bbf30284085f4e9a9e9a80d2d5610a7
SHA5125ae8ffb201d6bec6f3b245727521419a30258f1e9f083272f75aa919582b40b1306751957f1e69d3b7fa19fb1474faa2f83b7db08d185d6bf20377eb9a23f199
-
Filesize
1.0MB
MD53b781dfd982a6d4498397c397a918168
SHA1180c7647b01fd80c48909f02f8bd28754a9ab323
SHA25695d05dd57a315d0ecf96c1f36679669522a127815aedc56e89146b81189ea0b8
SHA512df80bf589cee6da6bc8e8bf83f031c471d524fa2d4cd6143514de3f6416b70c76886e94a093f4bc6b84a3cbee7a1179547e89b4ad2b9b5549b961e4f4e5ca21c
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5105995bfae839009ec329054aaef2780
SHA11e8d580fc59d5823b4d58d851ba9a5d93a645bfe
SHA256762eb4dd040756bed65205772e31c9a88e21dd1e78ea074881f38d753b5b44f6
SHA512909f694c7171eb73944a566e8ac2fa41f984e35628d2b1a90d21ecec3586d7085090e13adaee5cef6f9e32c8e54ccadb413c5aef457ba2a3cf66013416f1b99b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD509e506b7245d06f0fcd285f293ca747e
SHA1bc5d7fbe70c49110de8e003430a03a146128ba4c
SHA2564bfcbb03be5322867568e0bcf011f4ea53d8f4833a2237e210d06515804d1778
SHA5123981fbfcbd6ab16f504f923b5d0739845ef281c0c4bb0ecf182b4ebea9e4c4e551dfa28ac978bcd4a8e1823c7fa8be162191621fbe69fc87443fd9cd5511c556
-
Filesize
108KB
MD505b908ae4ec06d21b7c4072c9fda7d1a
SHA1ec1ba04396062f9edb6aa89e4249a8858071b125
SHA25675518f5a73d7c57433953b3d1eab264f195f86ca31953523ec5029780c9005ac
SHA512aa96df68e2185f767c43d57ea5370f5ce3b4f97ac3d4af8e3ca4e4ba339ca989361be20dbe9e64ca3e8dc7b56f3ea94cd6dbb7ba4bfd75f1d587b18ba969d4b8
-
Filesize
173KB
MD57bd69216ff6553417c69ba206c464217
SHA158147168c859eaef2ad7b25c16347d4e9d86f6e4
SHA2562a6da5e3c4adfa9a4aab66d017d62779ca0f2a8694ba412bb38c5be9c3f8ddf1
SHA5122c4bbf4a3ce0a574942ab677a43f02865dcb83e48fbbb9b5ed1591984216bd69bf4fbd4c134a5c6afd7df447fad87d703fd9c23ea3a5ff2b97109451e38967d8