Analysis
-
max time kernel
147s -
max time network
153s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
13-09-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
74da4485540677b5c45a0e5c415c03ffb1a2f528ab7ca498b07eb4374b01a07f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
74da4485540677b5c45a0e5c415c03ffb1a2f528ab7ca498b07eb4374b01a07f.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
74da4485540677b5c45a0e5c415c03ffb1a2f528ab7ca498b07eb4374b01a07f.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
74da4485540677b5c45a0e5c415c03ffb1a2f528ab7ca498b07eb4374b01a07f.apk
-
Size
4.3MB
-
MD5
1c28203c795d868b4f904d7ce30d9e0e
-
SHA1
a7dd956d86ec7c965ca081a06515515ed893dfdb
-
SHA256
74da4485540677b5c45a0e5c415c03ffb1a2f528ab7ca498b07eb4374b01a07f
-
SHA512
5b79535f58ddf21b24689847c1910350f2c55886f8b9bcb8a64e35c0ff16fc522af93b8872a259b07f863ba79cdbe4226081edbd356fb24df4a43ff36e277e48
-
SSDEEP
98304:mTwSJipFECPyNWtiA6/mNhoiirrJ56Gsz/9u4NMX9hiovUVUEnCGs/ND8:mTwqiLEd8xNhhirrJsGszFu4NMmDvr6g
Malware Config
Extracted
hook
http://193.3.19.233
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.qawrmpbgy.broygttca/app_dex/classes.dex 4302 com.qawrmpbgy.broygttca /data/user/0/com.qawrmpbgy.broygttca/app_dex/classes.dex 4327 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.qawrmpbgy.broygttca/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.qawrmpbgy.broygttca/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.qawrmpbgy.broygttca/app_dex/classes.dex 4302 com.qawrmpbgy.broygttca -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.qawrmpbgy.broygttca Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.qawrmpbgy.broygttca Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.qawrmpbgy.broygttca -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.qawrmpbgy.broygttca -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.qawrmpbgy.broygttca -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.qawrmpbgy.broygttca -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qawrmpbgy.broygttca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qawrmpbgy.broygttca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qawrmpbgy.broygttca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qawrmpbgy.broygttca android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.qawrmpbgy.broygttca -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.qawrmpbgy.broygttca -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.qawrmpbgy.broygttca -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.qawrmpbgy.broygttca -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.qawrmpbgy.broygttca -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.qawrmpbgy.broygttca -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.qawrmpbgy.broygttca -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.qawrmpbgy.broygttca
Processes
-
com.qawrmpbgy.broygttca1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4302 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.qawrmpbgy.broygttca/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.qawrmpbgy.broygttca/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4327
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD56eb7c646d5fcd3c7eade91bde0228dbe
SHA1dbe858d5ac24ec4b6744afb758bc14b2a7429db3
SHA256a86835d895a0ec887b57a8c6bc47f75c7a1e1f268672b3350b66b6582f5de39d
SHA51269c524c02a7f2442b84a0e06fde75e196d840983c5a7178f9b96c384a0494595d86693e5ba99bb96efc1a65894d4b755a014655bb9543f726d65d4c2393a8b81
-
Filesize
1.0MB
MD5d2ef5ed75e91475c5d8b81ff4715f5b5
SHA14fcea60fcee540ede0f65cb05779e8e15be34296
SHA25664b1dd47fc2a5e91bfa68df7a45d3ed7f21f6101e2d4e2891eee8f0f2d2b24ff
SHA51282fa0ffe7fd28c07e5e32e48ef950759a86ca5ef527b71cbb1aee081a05b8116f341743b6d44368b9f343428a3d5b8d473f0e6a69ff7791c44c1f2af28778f81
-
Filesize
1.0MB
MD552b7bb145368357741e62c46aa73cbf8
SHA1df56b0486525c0d7b788462e0d8379adec0faddb
SHA256364a8fff88c00ceca5060ed0aff550e249a0b29eb39d870c5421b1732bc09c23
SHA512fead98701cf6fba43bb873333bbd157a78c7f0fbfa32fd16317e72d66de1bf37289d5fe2953e47bcf6cfd8c13741e6ab721961a5d87279ebaf8541c065d7da5e
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5495fbf87313ee0d37ef03bace0473b3d
SHA18b367bf9f0d18d01cb6958194d0291567a724cc8
SHA2563a1509979013c72ba80671319c8c1fc999071f84406643cbe6c8f5196333f849
SHA51207aa92cc8a5b05c5c4dcfc018efe825bfe0d1f84336032c6091e94223e48b283e499e6ea2635e1d7c55fafa157a2bf188ab04ae03f64996c627e81cd2f379cb6
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD546ddbd2bb54e1a03bddeade9586bf206
SHA11fd8845a4724f63c7a97b1685d38abcde508de31
SHA256be91f5da9454f0764a720c4fe67a21cab5ee1766ea30f7d6415d784849c08364
SHA51209bb6586f5665feb72c6301fd79498921cface9eb753b85254a1a60279678099ea8219ee42397dbf1f663e2d47227c25ddb95c970531e384d8629954f42ea2f2
-
Filesize
173KB
MD5b006d52979ae13de6bdf78d6114b182d
SHA1d6c636b13ca0df796564f04d99fc11bc5aa1377d
SHA256a5e02338b6ac2b1dace8f5092fb363736654974082adba9751363f2b50ae3d1a
SHA512da90939e9f7d4590d009be0fc4a131adee5258265a791db6bcc24ff3fd043637f1b3b19cf43afb0a7f9437d1f7860f3a20ad5d107e57f766a31753637b4dc3d7
-
Filesize
16KB
MD50dc307982da4f935e83bc95d0e712d55
SHA111b91964c00b232cad2f3bcd2a9890a031cfbe76
SHA256fb59bf0c11e32c34759182682568e5267400bf007fbb3faede661ff2a40a4c59
SHA512bf737e0192b3931640fb90a51ebf0620bcd0cb4396afd307c178dcdf21a4cb5330c0a996d164638cc1a930e53f762c7ef078c6a1b70c1e4dc2c3c1fae585b276
-
Filesize
2.9MB
MD595eec13f1c9997d1d4e304bb8ab5f050
SHA150c6e915306a5eda69c6c4670e08e56957e8c658
SHA2560e2c78f5409353949b310257d2271df281ab59c4c42054d5e482e07d0ec27d9d
SHA512c6e842fc3c6c32e6fa540fa13f3aafc2b45dbcda9dc18e8deb4ed9005261a31708458e3a8d217bf49c6f2209ee4bd14395d78f8449dfeb63f1ce8b4b302256fe