Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
14/09/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
-
Size
4.9MB
-
MD5
c229ce01af12e505416c47a314593671
-
SHA1
cee2f6a58e7ddf87176d6ebbcaf9a09544b7cce8
-
SHA256
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75
-
SHA512
154a30e287c658e686d8140b19f3be20d5ce12500e37ac6df8fc702470a15eb7baa557d0bc120e7c031e83ab30b5469b2b402e1a000352231a7bc77eb9774b88
-
SSDEEP
98304:OawRaZZtUmuRkeDfFUK6Tem/f0MZL5byOQhnjvGlzULqTIgUdYUNSu+1KiYZ:OcP2DTDtURz9yfhjezUOCYudrZ
Malware Config
Extracted
nexus
http://176.107.160.94*
http://gecebizimhaberlerdeizle.co.vu/
http://yaghaberdestekbizden.co.vu/
http://yardimmekanihavalihaber.co.vu/
Signatures
-
Nexus
Nexus is an Android banking trojan related to the SOVA banking trojan.
-
pid Process 4249 com.music.roof 4249 com.music.roof -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.music.roof/app_DynamicOptDex/lGqL.json 4276 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.music.roof/app_DynamicOptDex/lGqL.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.music.roof/app_DynamicOptDex/oat/x86/lGqL.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.music.roof/app_DynamicOptDex/lGqL.json 4249 com.music.roof -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.music.roof Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.music.roof -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts com.music.roof -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.music.roof -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.music.roof -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.music.roof -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.music.roof -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.music.roof -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.music.roof -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.music.roof -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.music.roof
Processes
-
com.music.roof1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Reads the contacts stored on the device.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:4249 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.music.roof/app_DynamicOptDex/lGqL.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.music.roof/app_DynamicOptDex/oat/x86/lGqL.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4276
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD528b6a108b49c16e0d4e42fcc4fa97117
SHA13f8621a972029d57e78cb4f1ee1b1978a52e13a8
SHA256160a3acbc4bcc0b4451f0ac7acabf091496429056425c28cd73638338fbd88bf
SHA51201c3e973df1bcab87e9e1daf6fec903310ba3ed8e48b91ad61d415ecba2f489e0918293478bc717c4ea0b37fff1338e34fd7e9659bc0538a6adee0ea53d3ca1b
-
Filesize
2.2MB
MD51df289f778508dea655cf7475e4d0c94
SHA1e6d7ec17d4393e13ca98c453bcfdc093b3226255
SHA256da3185693f31a8c765f140f31ada2ff57fab38f524ba62bec4a18be86e93d86d
SHA5123a32faea97adcda0a7a25d613ca65b8f91b25c1996b6b898e4e87a4759e78a3a74f14e4dee22c858192c225483f1bd043031f0bce19a9937b5c315ebc3e95a0c
-
Filesize
2KB
MD548865745c77be0188cb327ab5782a80f
SHA16ea73946201d2add3d9ccb2bd3181048dbd125eb
SHA2564a9d2013fdc8e8416a5c59bb57e3a71f9274ec6d6304a6b3fa26d9f22de9dfd8
SHA51250ef68d90e08e546e84b263efde76a223660bcf7b9bdf3293340257f9f661407adedd3201c5cbcda649da61cb084a3973682a86468f3313a98d795cdff782645
-
Filesize
2KB
MD56ccc062d48f90ac216ebdab3e2ef58fb
SHA10e8b565e42fea7e829bf7db6d36b3a3e9bbdd99d
SHA25609cade782573bf218d056c8ad8df9360109bd9d3b94c7baf3c767d14da3de772
SHA512c833bdff04174d4f156002239178195debf6f428b1f6b1a5b957d00ad29a59065fe9f0886cee850c381b12caa100c0c73cc4d63648e5518a9bde18b3dd0de03f
-
Filesize
2KB
MD5e827f04955d9274c8411082466b5df4a
SHA16d8724ae665f8aa66518df67a2d3f22f624cc4c8
SHA2566ac9d4baa9c61f90f64e7c82031b51a3f8e70f08bc26d12870fe4813a803d1c7
SHA512c67d2f2b4a0db059f72d02dfcc4cd88ed7ab466afaef2335e492c9a674133b51035db536d10821fbaffbbc6eebfb75247d2df30f4569d7a226f275aa40c2c58f
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5aec9f82163f82cc056db4d78381e97ad
SHA1998e748a016a297b671563c77bd0a64d034e08e9
SHA2565bbb150c761a6c8de36ca405f07de5ecee5bfe8faa3eb9b52b4e51411411df71
SHA5125b0242510fd16cea76eff757ac9fd02ab832153361494556728f9275a085f193ff6b663d60a0365c387ec5eae5089cb90e7346dc3e27e0d5ecd369c069abf406
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5cc2d23e3f11faf77638e03da9915483e
SHA196f70dc6250f4455e029211eba8583d94b8b534f
SHA25684abc053a878d8009e6aa6560fc7a52563f15b41b4f8830de6e7400887b5b9d7
SHA51294f6c9ccce74ad93c40fdf98742c52972ed3c85d8f0c308a3d1c809c6275197726373b98cd62574c004e544a07ab02e0db72ad66270bc21624c6b8fd61a2002b
-
Filesize
197KB
MD5765fd8dc60052dfc1e241e66da627ee7
SHA17823b85e1b98fb9b44b5a8040b528b55f2b4063f
SHA256d6b3090d06a297c9308d64f5271b961da2b39c9e6510f51282944432ab135f58
SHA51262ba08cdff27f185b596c1ec327ee117135476d81f55303dfa1afaca0606ab4a3841d8086aadae0810b61500b3a5acae66afdd0a49f9be53502997f1db37163d
-
Filesize
16KB
MD5236ea74dd9aa66250155f1366befd4b8
SHA157705a5a0931808c51e9cb69b7fa7b65cc1a2331
SHA256671218822aefa24c23ee9232b5b98806d4d62ffc0f586b0bfa869fd4feb557ce
SHA512e538dc4336b9f52a3925a66d7bdc0a6791f8ccfec6126b53c2e68f0b44f07577fd76494e6b61525b7bd316ca860cb08e2cc76eaa6c387c2f309f545b9d4cb9b7
-
Filesize
6.1MB
MD5b0575cbeb798a21e3241e5f0b2d0686a
SHA1dd983e85cb65aa96361ccca6a04b609f1986f25f
SHA25656a2b16d2f2419b1eec2933f4c33edb3b4ea8a4fed4734c943146029f711f1d4
SHA5121190729bf90b1730315313a709c072ba3698707cd160f920b1760b9d10856d9b04db5b3c1bc6dd1d4cb9e7f6bb42910bccd3881c1942d42237367e6e17e08745
-
Filesize
6.1MB
MD551c7cfb2b17b9518627ef951e7a56ab3
SHA19e28d1114e1e6c1c1e261f029119eddd9304118d
SHA25600d56a1a5108705da2dda0d7755d0fd4a3d81547b1630a49a62b5c0cc68c5aed
SHA512d38c218871175ce25da574781feeebb19f152e8eb7379415011bfa0ed5818b818318020ccbf393ed41211e45003376bd0f8b11d3fdc2d38a1c3e72dc5e2f3d60