Analysis
-
max time kernel
130s -
max time network
153s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
11-09-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188.apk
-
Size
4.5MB
-
MD5
b978be7c10cc9ad633297b325d0e5f8e
-
SHA1
b62ad6474e0c491b3bbfe7aa425e2f3963405fc3
-
SHA256
da68f3761855cb416561719126b46cddb738dd36930d9005073b554bfbe88188
-
SHA512
82c9f0ad84dfa476a26fbd8f05d7703d7e10183d221c54da49c187996be1d91984546122f39ed32f50694edf33ca43eaf6117cba38940a1eed0d59a3e708c5c3
-
SSDEEP
98304:ITTdJbspOYwzTkg1jm6CwKEVQ66hZoIQnKIetNmZDx25q5yE0AoR4Y:K3sh05sFEVQTLI2mRxj5yE0mY
Malware Config
Extracted
hook
http://185.147.124.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mfuhhbhyd.anrsgvsgeioc pid process /data/user/0/com.mfuhhbhyd.anrsgvsge/app_dex/classes.dex 4509 com.mfuhhbhyd.anrsgvsge /data/user/0/com.mfuhhbhyd.anrsgvsge/app_dex/classes.dex 4509 com.mfuhhbhyd.anrsgvsge -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.mfuhhbhyd.anrsgvsge Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.mfuhhbhyd.anrsgvsge Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.mfuhhbhyd.anrsgvsge -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.mfuhhbhyd.anrsgvsge -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.mfuhhbhyd.anrsgvsge -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.mfuhhbhyd.anrsgvsge -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.mfuhhbhyd.anrsgvsge -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.mfuhhbhyd.anrsgvsgeioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.mfuhhbhyd.anrsgvsge -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.mfuhhbhyd.anrsgvsge -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.mfuhhbhyd.anrsgvsge -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.mfuhhbhyd.anrsgvsge -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process Framework API call javax.crypto.Cipher.doFinal com.mfuhhbhyd.anrsgvsge -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process File opened for read /proc/cpuinfo com.mfuhhbhyd.anrsgvsge -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.mfuhhbhyd.anrsgvsgedescription ioc process File opened for read /proc/meminfo com.mfuhhbhyd.anrsgvsge
Processes
-
com.mfuhhbhyd.anrsgvsge1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4509
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD56ee308869afd47ed550b4404db020f0d
SHA1f0fc3b841ceb0bfaa3fac9df8f48dbb94030ea70
SHA2565af756df5b912b317f459b4f632708e89534468747d8ed9a9c18e944e762d0ba
SHA51294444f49771a610150ab1c51accf2db9aba1a0b42d541015f67e9193a76e1ffb274801876b86f7e769f55753ab9a341ce56456ec2a4e09d7df5a9fceb8499c3f
-
Filesize
1.0MB
MD54dd1a2fc4702ccf385ebffcb398262aa
SHA1e88ffcb75c28e17f6cf2d5f765e94c0741c571eb
SHA2562d842dc62a5a7443a54bd44848735759dc3f95919679db94254c7a38b4a02f66
SHA512a7c404519584b8f0b981b7dac3b7ec8e7ab400f7fa5347dbdf52033147d18b06aaf9998d215b3b05870511d68e65e3b2aff965bb3b3de260651e2cf571e1f8d5
-
Filesize
1.0MB
MD54643fce6e599187bdc1fb8635b012fe9
SHA173b144794508156467477ad2ca3b858982c18482
SHA256170d44b56f9171ea4ab0b3e3f64d7e0d862e90ef76ca8229c2cd512a07638ef4
SHA512fa79bfcc50f1ddd9e39d18f56ebb1f9984c0c26661f8724c5b465d45efa70c43f7067f1e568788ba7071bb6a7e373493cf342f77856b5961df4524f8a29cbb01
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5f4fd8c28aaf3fec17b6fd3b3605edc54
SHA1dd14ac59a90361ad3da1ec5709ee2df14464084a
SHA256ac45c742c2e551a4d5cce33e02de907b133f6c42f73a07249266d85c183b5e05
SHA5126f5e3e6350b76170c5beb04c5a52ae0a1dddabc513a5da507c0560ebc83777be0f14c152d1c485805d5bfd8ba71688cb1c3a66aa803e690f766616ede7f35d3c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD519ca651762ae7db7066ea5cba5ab947e
SHA1ba596071faab8c35d667afd939fd463f8955736b
SHA256c9adaea349d8c76e4a4c09a42ea4c6a87450de30d99965a55c7a456f64531612
SHA51229cb68e6025e23473ed7984107f5687ef0414397050f1a07fd1fb895ce2531d21a8f5410f894076b40f28a4282cacc9259af83ff9b8bc565f3d8469274eb2fb7
-
Filesize
108KB
MD55aaf8443b247fc9819501fd7a910d574
SHA1562d23a3dbc9e501f4610ab192514205cc646fd7
SHA256622de0701275a6af20ba236b90e84fe019d55793b073fdba61a9f71ba025955a
SHA512028df5c4262fffad6b1626f5ca37ebfc9b52a77bf4d95a09b00ab99a13ef5ec530bb7d9607ca6d5df45b697d4848983eb28c354f0e607b6d635aa1f79f23b09f
-
Filesize
173KB
MD59b384029b5c3b1551c10c83a63ac8913
SHA16bfcac23fefde6761d376961da6633509c77f301
SHA25636ec911e6007b2fd80b4757136eaddedcc52e77d724cec267278fb0c53031d77
SHA5120dec868013e86b8b7f0c013f8eeb2b1d24a1f2c748be1c27f8508aab9639ffb69bba0357374a6f727881f301e1c342e476c2314a7847a8ae6da8df774838f0be