Analysis
-
max time kernel
130s -
max time network
163s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-09-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
-
Size
4.5MB
-
MD5
b978be7c10cc9ad633297b325d0e5f8e
-
SHA1
b62ad6474e0c491b3bbfe7aa425e2f3963405fc3
-
SHA256
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188
-
SHA512
82c9f0ad84dfa476a26fbd8f05d7703d7e10183d221c54da49c187996be1d91984546122f39ed32f50694edf33ca43eaf6117cba38940a1eed0d59a3e708c5c3
-
SSDEEP
98304:ITTdJbspOYwzTkg1jm6CwKEVQ66hZoIQnKIetNmZDx25q5yE0AoR4Y:K3sh05sFEVQTLI2mRxj5yE0mY
Malware Config
Extracted
hook
http://185.147.124.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mfuhhbhyd.anrsgvsgeioc pid process /data/user/0/com.mfuhhbhyd.anrsgvsge/app_dex/classes.dex 5080 com.mfuhhbhyd.anrsgvsge /data/user/0/com.mfuhhbhyd.anrsgvsge/app_dex/classes.dex 5080 com.mfuhhbhyd.anrsgvsge -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mfuhhbhyd.anrsgvsge Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mfuhhbhyd.anrsgvsge Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mfuhhbhyd.anrsgvsge -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mfuhhbhyd.anrsgvsge -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mfuhhbhyd.anrsgvsge -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.mfuhhbhyd.anrsgvsge -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.mfuhhbhyd.anrsgvsge -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.mfuhhbhyd.anrsgvsgeioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mfuhhbhyd.anrsgvsge -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mfuhhbhyd.anrsgvsge -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.mfuhhbhyd.anrsgvsge -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.mfuhhbhyd.anrsgvsge -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework API call javax.crypto.Cipher.doFinal com.mfuhhbhyd.anrsgvsge -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process File opened for read /proc/cpuinfo com.mfuhhbhyd.anrsgvsge -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process File opened for read /proc/meminfo com.mfuhhbhyd.anrsgvsge
Processes
-
com.mfuhhbhyd.anrsgvsge1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5080
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD56ee308869afd47ed550b4404db020f0d
SHA1f0fc3b841ceb0bfaa3fac9df8f48dbb94030ea70
SHA2565af756df5b912b317f459b4f632708e89534468747d8ed9a9c18e944e762d0ba
SHA51294444f49771a610150ab1c51accf2db9aba1a0b42d541015f67e9193a76e1ffb274801876b86f7e769f55753ab9a341ce56456ec2a4e09d7df5a9fceb8499c3f
-
Filesize
1.0MB
MD54dd1a2fc4702ccf385ebffcb398262aa
SHA1e88ffcb75c28e17f6cf2d5f765e94c0741c571eb
SHA2562d842dc62a5a7443a54bd44848735759dc3f95919679db94254c7a38b4a02f66
SHA512a7c404519584b8f0b981b7dac3b7ec8e7ab400f7fa5347dbdf52033147d18b06aaf9998d215b3b05870511d68e65e3b2aff965bb3b3de260651e2cf571e1f8d5
-
Filesize
1.0MB
MD54643fce6e599187bdc1fb8635b012fe9
SHA173b144794508156467477ad2ca3b858982c18482
SHA256170d44b56f9171ea4ab0b3e3f64d7e0d862e90ef76ca8229c2cd512a07638ef4
SHA512fa79bfcc50f1ddd9e39d18f56ebb1f9984c0c26661f8724c5b465d45efa70c43f7067f1e568788ba7071bb6a7e373493cf342f77856b5961df4524f8a29cbb01
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD535b38342cb3a64d6a42bb45a3f9a3a1b
SHA1cff4246d6fe05041681cdd1cd0ec64de4ee22caa
SHA256b9a7cc5d001ef11fd371256455535d54d8b67254c448eae0fc8c6345dcd28e5b
SHA5122c939c3d29654f7103f0246e7e3391cad2db953d877b72cb7914ecd71b06c6cd17e613f45ab99bd2c41dbdf2395d516a7c8d138c955289aa2f8a414a7240bf73
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD57d7b757b7448c8ae2c342979aae11777
SHA19c2ece4e07f62e18fbba522cc0beb6fc1c98b677
SHA2564ec77eae229173e05955e6db57b8dfafa14c460860f943a1f5a82057dee1d8af
SHA512075786a13726ebd75263a086ebb74dfcb2fe7b315b38e441034cb149c5a1cb909316ef61fa020d965bcb04461bfaa1b4e6ee6ac48fa48b84e2633ff598ce36e6
-
Filesize
108KB
MD5405476aa6dec39c3f13211787e27e4e5
SHA1f651a8977e1ad17c2b12cdff5113d3297671de0d
SHA25682679169f83bea78bf90ac0dcf58ead9e4032d29d8a1d33284ddce62d80eacf9
SHA512743b4ff1a5e5b315890f8c6f2a6ceffdd05cf02b0372fdc0b7b5c1d69c43317b136dbb9a4d4358d77179306dcc65eaee1ab772b3e6b2dea5421756670da55b23
-
Filesize
173KB
MD53a109aa2f717a947918a742f623ff145
SHA1c6ae70c17e006dd9c5f5d904e87ad687c10d3e5b
SHA256c44faa13acccd7e2ca3a0eeebabd0f149dc49936058d29a03997077b45448200
SHA5123f2428b0cbd34e1c38da86b43bc1bd568e8e503c1bf805cd9b9c3b71e96a32790fd6b317e184b2b85411dd7690ff69993dd30dc456c19f9a66a87819209dbe30