Analysis
-
max time kernel
138s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
14-09-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
558234427065b190153597d49b26a64fda69ce6ead7419d568702e464115bc21.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
558234427065b190153597d49b26a64fda69ce6ead7419d568702e464115bc21.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
558234427065b190153597d49b26a64fda69ce6ead7419d568702e464115bc21.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
558234427065b190153597d49b26a64fda69ce6ead7419d568702e464115bc21.apk
-
Size
4.5MB
-
MD5
9998c68a71fd2e2035c30967f48f4332
-
SHA1
d2f7934bee6bbcbd33f872798ea47f47ce600936
-
SHA256
558234427065b190153597d49b26a64fda69ce6ead7419d568702e464115bc21
-
SHA512
a9341fabd87b575ab4b034ea87bc7d6f7d4e9cac5b2785c6698ec8a4135aa075833f916a10c8ed3ed7dab2c1da32d3f88094e3f3f219c82a847bc5301beee67e
-
SSDEEP
98304:XqQ+yElnnZDdBQ4m28aatk2Js0ugCdyNB/f9hsx2KJlianRBexzBF:OnlnPBQVraatXJegCdqhQ2klfnirF
Malware Config
Extracted
hook
http://80.64.30.123
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bolaoixyx.pacaaopiq/app_dex/classes.dex 4495 com.bolaoixyx.pacaaopiq /data/user/0/com.bolaoixyx.pacaaopiq/app_dex/classes.dex 4495 com.bolaoixyx.pacaaopiq -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bolaoixyx.pacaaopiq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.bolaoixyx.pacaaopiq Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bolaoixyx.pacaaopiq -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.bolaoixyx.pacaaopiq -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.bolaoixyx.pacaaopiq -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bolaoixyx.pacaaopiq -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bolaoixyx.pacaaopiq -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bolaoixyx.pacaaopiq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bolaoixyx.pacaaopiq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bolaoixyx.pacaaopiq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bolaoixyx.pacaaopiq android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bolaoixyx.pacaaopiq -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.bolaoixyx.pacaaopiq -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bolaoixyx.pacaaopiq -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.bolaoixyx.pacaaopiq -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.bolaoixyx.pacaaopiq -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.bolaoixyx.pacaaopiq -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.bolaoixyx.pacaaopiq
Processes
-
com.bolaoixyx.pacaaopiq1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4495
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5a2c5c17b3307726055b49289cc4646e0
SHA191557d92b9e519a399685eaab27a0858a3d4dd37
SHA256f5c5c2195cf1e141b7cafb2780005c8765dad1a8edd9293a57e6a201b0568938
SHA5121782344a2fcfdad5cbe33d018a5d7c35c0000ec9da2c5fc7ff56ac74f697b17450be36fcfb4637590c0a04762b56eb8c7ba6f8c54f264a1f82a5f79d4421c26f
-
Filesize
1.0MB
MD5fca9d42e2678a461dd90a098e693ae4b
SHA1a19558fb6a83ca6eaf0cd5dcf2a86c05a182f3be
SHA25690c7aeec28ab0984873209c1463234d85b9002a03bfe1970a12c290cee5b0fc3
SHA512bb9303c3c4c7777809d8786f67fa19d449b092ec36e0f3884a88ab071b63a250d3923f514baaa54fb8be745805289cd7132799bad1670fe30ef496bad09dda7f
-
Filesize
1.0MB
MD5fb24f22a86d8f227257da2f25b56a551
SHA12af02a7d034bd8ab5dd831e2b5ce1f4de6b3a64e
SHA256037a690236cef5d87b743c8dcb9e412b48f694ff1958143667f74f48b5d5ae03
SHA5128ceaa97c365d064fb71b93b961bd36e963bb58616919d246e8895057823b55a17729331fc97c6fd776769588f6b7029dc0da1e58bb1ffce1b9d0244e50db7876
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5c059f9c3214ac4251668e222551ead44
SHA164f6bc62bfb29cdb4092108e00af8d673f76cb6d
SHA2561947bc317e24929d66348e36af0bfd34200b5472bd4253827e3b22174fecfc9d
SHA5127a22f470fe70f81031ac40f2fc7452b49fd860a56a1921e8ae9c42127ebbc0d6c7e8dbf8fb82f8d609d6962722527fe31a404260e82215c64dd8aad4e6bc73d9
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5787ad9a822832357929f35c96068b8f6
SHA15885a785d7bea65aed45eb78b378c122a398b6b3
SHA2568cb19932c5b78e176c13cb6d9f9fde1ae7470b02826953c24dcccaadb11febd8
SHA512425221b00c8bb5e0669e2d20e8fb339b6b8a2fc53eb3c3b1304b079f141d1d7956982b23fc409c894528048bd689afe25d18c4747f2db2d9a0d839064aea7426
-
Filesize
108KB
MD5ee01d54a0ebe7e29d8ec1eeeb9e33d90
SHA185956e4f1f58b282610e88cf35feea03259c4e10
SHA2563a974f427d696376399488902a93d9731fcae0ddb04941f6d5ee2c839a0591ee
SHA51244832189fc0635142a2eb65e62429138a30fe60d1ddce1afd5c465901819301b745b7c7b6ec18a9b48f250d263b9a8228eefb6a2127b749abafc7c6034f48e6d
-
Filesize
173KB
MD5c309ea423970d7b5b8613ddd999dc909
SHA15f9cb8e2094f730b85cbd8b29bd89211b05e5d91
SHA2565b87ee36af12a6dddbef8e892b6fc4825bf7c7bf33a8aa73b7b067f573a495da
SHA512c1902b3e3a98a71bffb5df83d9215c937f4c5d4a6dd8a9b64ae34ece82787af1485744f1841f7c0fcaee5a06d8834f549cd6287a5dac824608a618f1ee36f7ce