Analysis
-
max time kernel
149s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
14-09-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75.apk
-
Size
4.9MB
-
MD5
c229ce01af12e505416c47a314593671
-
SHA1
cee2f6a58e7ddf87176d6ebbcaf9a09544b7cce8
-
SHA256
14db9e4c730614c59fe2ca7e5b91f82cb05b316ec5c5d05a83c4ec74a55a5d75
-
SHA512
154a30e287c658e686d8140b19f3be20d5ce12500e37ac6df8fc702470a15eb7baa557d0bc120e7c031e83ab30b5469b2b402e1a000352231a7bc77eb9774b88
-
SSDEEP
98304:OawRaZZtUmuRkeDfFUK6Tem/f0MZL5byOQhnjvGlzULqTIgUdYUNSu+1KiYZ:OcP2DTDtURz9yfhjezUOCYudrZ
Malware Config
Extracted
nexus
http://176.107.160.94*
http://gecebizimhaberlerdeizle.co.vu/
http://yaghaberdestekbizden.co.vu/
http://yardimmekanihavalihaber.co.vu/
Signatures
-
Nexus
Nexus is an Android banking trojan related to the SOVA banking trojan.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.music.roof/app_DynamicOptDex/lGqL.json 4964 com.music.roof -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.music.roof Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.music.roof -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.music.roof -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts com.music.roof -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.music.roof -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.music.roof -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.music.roof -
Performs UI accessibility actions on behalf of the user 1 TTPs 15 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.music.roof -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.music.roof -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.music.roof -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.music.roof -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.music.roof -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.music.roof -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.music.roof
Processes
-
com.music.roof1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Reads the contacts stored on the device.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4964
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD528b6a108b49c16e0d4e42fcc4fa97117
SHA13f8621a972029d57e78cb4f1ee1b1978a52e13a8
SHA256160a3acbc4bcc0b4451f0ac7acabf091496429056425c28cd73638338fbd88bf
SHA51201c3e973df1bcab87e9e1daf6fec903310ba3ed8e48b91ad61d415ecba2f489e0918293478bc717c4ea0b37fff1338e34fd7e9659bc0538a6adee0ea53d3ca1b
-
Filesize
2.2MB
MD51df289f778508dea655cf7475e4d0c94
SHA1e6d7ec17d4393e13ca98c453bcfdc093b3226255
SHA256da3185693f31a8c765f140f31ada2ff57fab38f524ba62bec4a18be86e93d86d
SHA5123a32faea97adcda0a7a25d613ca65b8f91b25c1996b6b898e4e87a4759e78a3a74f14e4dee22c858192c225483f1bd043031f0bce19a9937b5c315ebc3e95a0c
-
Filesize
4KB
MD536cfbc8db86b339d35e3bce4af929524
SHA1cae2b693f04d830625c5aa4b3dd71d0f8f8d1db8
SHA2561048825e410f32e4e84b6e5ca5f2a48ed3f203c6802b656e3ad4ca90ec43886a
SHA51298b2deda81d0f1c771d4841e358f2c1b1101a66e8ddd0ba7a6f4dbe02e163bf1aea0532e8120673f5544e78e3190bed864ec753d20d8a151bfeaa4c93cb33e8c
-
Filesize
4KB
MD514558602299989410a937089937ea12f
SHA19404103b26064c1c01aa1ca794b03d4f87c35860
SHA256dcae28fd9d91221bc6596c8e9095a4a6287332aaf039528996bceeef707c1637
SHA512a4a22bb4b7f17089dd1bdd89d198990c83587de78191cc12ecbe67ebf8a20fb38cc20ee2674f4183160bcfa4211deba64443ce6aee7a3ad45e971a6264b29713
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5f24160fc1853184d72f87831eb10e035
SHA1b041558b05ddd4f45aba1c8e336a164d8b120d6c
SHA2567d23b0fcb0e6b1ee7115153714818aee86bb93fdcd62b4718111992c6c6c1b8f
SHA512aa891b33d7e8ef1d70f03b16a08db318fd742f484a2998a4935228c80d3daf4214b65e1d84d25360705ea3d48de8c089c8b9ccaaf051bcab36ba004f13129046
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD567cac71391d4beca0bbfa2f7e34e7cba
SHA1702ae11228a87ed977689b7958db28a906a54bf3
SHA2569761299d8d991de62ddcfbdd8994f427caee17b1f115cf224b63bbcdd8a91d9e
SHA512c86cfe64c6af478cb20639932dba9dae6c605d027f1875c3e2f8427027c0bb746ca1b8d5e2de30fa40cba88d7c6e21637187a506637eff266d73e29c7d854e77
-
Filesize
108KB
MD5083be31c1de9af4af9d0463c82159af0
SHA155ea40d98c466bb7ab2fe2b8981e0864f2bebc43
SHA2569a6249bfd4e670e7adbc0cd6d7d4509882221f0f393a13fa43e665b90787d529
SHA512123558c93ce9fa265c09be4ae2f9a422ea068e6e883c11af7816aee41b10f197fa0414e132a822d7f615db474f948287d2909093a81c93562ae238230b88df93
-
Filesize
221KB
MD5ac28242a1962c2c4009c73898c6b3be2
SHA1f7a07337aaa45227b372b992edbdce54d43f114b
SHA256bd5bf8946ed4c70d5cf470da3ce0249144aa2c465b6efd2211a67d9ac0dd308a
SHA5128281edbcd9a46498e200f2d7830d2518661ce0aed8be07469056180cffcea2ea0c53187106c70bae0d023c8f17a9d527b7787508bee31764887364b55a210655
-
Filesize
6.1MB
MD551c7cfb2b17b9518627ef951e7a56ab3
SHA19e28d1114e1e6c1c1e261f029119eddd9304118d
SHA25600d56a1a5108705da2dda0d7755d0fd4a3d81547b1630a49a62b5c0cc68c5aed
SHA512d38c218871175ce25da574781feeebb19f152e8eb7379415011bfa0ed5818b818318020ccbf393ed41211e45003376bd0f8b11d3fdc2d38a1c3e72dc5e2f3d60