Analysis
-
max time kernel
149s -
max time network
153s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
17-09-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
9db54cdc18a3e0dea2cb6b9aba0ed69eb8d971b8b67fa5a9ffd930a37ddc5e51.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
9db54cdc18a3e0dea2cb6b9aba0ed69eb8d971b8b67fa5a9ffd930a37ddc5e51.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
9db54cdc18a3e0dea2cb6b9aba0ed69eb8d971b8b67fa5a9ffd930a37ddc5e51.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
9db54cdc18a3e0dea2cb6b9aba0ed69eb8d971b8b67fa5a9ffd930a37ddc5e51.apk
-
Size
4.3MB
-
MD5
0c48f69456e65601c08c73c4c4fd59c0
-
SHA1
74fdfdd86cb2d11462baa4722ff3fb7f079a0733
-
SHA256
9db54cdc18a3e0dea2cb6b9aba0ed69eb8d971b8b67fa5a9ffd930a37ddc5e51
-
SHA512
3f16fbe0d684ce47b05c200bc4982c83d3b2fc3c18acbcf8b2690fdf107b10e895b9b90ef0182ff6aeddbebe4aaaed1b14c1bb741d7bcd70de1a7e68e589e1a7
-
SSDEEP
98304:ua0T1yGUteBOn68Ovq5QKjmac30fk1T8V5HGWQ9Q8VpIdHbvGZ8Dxt6:uFLCsy595cEc1TgrQm8cHbv/xI
Malware Config
Extracted
hook
http://80.64.30.193
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tiqncbnnz.vfnzxdhzo/app_dex/classes.dex 4334 com.tiqncbnnz.vfnzxdhzo /data/user/0/com.tiqncbnnz.vfnzxdhzo/app_dex/classes.dex 4359 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tiqncbnnz.vfnzxdhzo/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tiqncbnnz.vfnzxdhzo/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tiqncbnnz.vfnzxdhzo/app_dex/classes.dex 4334 com.tiqncbnnz.vfnzxdhzo -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tiqncbnnz.vfnzxdhzo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tiqncbnnz.vfnzxdhzo Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tiqncbnnz.vfnzxdhzo -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.tiqncbnnz.vfnzxdhzo -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tiqncbnnz.vfnzxdhzo -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tiqncbnnz.vfnzxdhzo -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tiqncbnnz.vfnzxdhzo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tiqncbnnz.vfnzxdhzo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tiqncbnnz.vfnzxdhzo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tiqncbnnz.vfnzxdhzo android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.tiqncbnnz.vfnzxdhzo -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tiqncbnnz.vfnzxdhzo -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tiqncbnnz.vfnzxdhzo -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.tiqncbnnz.vfnzxdhzo -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tiqncbnnz.vfnzxdhzo -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tiqncbnnz.vfnzxdhzo -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tiqncbnnz.vfnzxdhzo -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tiqncbnnz.vfnzxdhzo
Processes
-
com.tiqncbnnz.vfnzxdhzo1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4334 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tiqncbnnz.vfnzxdhzo/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tiqncbnnz.vfnzxdhzo/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4359
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD57b00b7e4d9ac3faa480ea6ad2971fb81
SHA12c5a71b4af9c5ff7c95d987fe8e2ffd3c2efb16f
SHA256b7b1d1972fdcaaeada5c1f02d3948f26f98b50653807bc3c38a4282ef42716c7
SHA5124cf331fe0ef65b485405b0607528f8ec6bcd80e7198e5b75116165b1b0f68e76bd1418c8a633905158d83877f4b1116fed063726bc33458d7e1d1eaf2a8f9b8d
-
Filesize
1.0MB
MD546047aa6a290d527cfd5b1e02bf09ab8
SHA1acdbc62290a07392cface55025611d16fd40e235
SHA256e504017b0d0ffd3b2938dfc9e52aba14948646dcca353d6b5b07a9c758c64879
SHA5129349d7f62508e3dcc9dbdcae4984f34813091a9fcbf1a4156e707e631c6541b077229d8580f33aeef47f806e0f97efa592cb1fc4c449d0562beadbad160e596d
-
Filesize
1.0MB
MD5c7de6d58b15843e6c67225f1d5a2a4c6
SHA1b7b1a56a2b38e022a5a86447bd3116a33698e8fc
SHA2566281ad605ebcfb9b120a308d8e734552dbf253dc3320817d88fb638a54aa2735
SHA51265c07f2f509d960bb4dac7f65bdc46544d8a266d1102da345a6539fd8a4d171af74dda0025158d9273da44a5cb2ddf9875ddcd6593e6eedc5f30ed525e5d83ef
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD562b42019ffc1f26a632658a7dbfa796a
SHA1f9d4bab2c579d8c41aa034af89e3c5f73f48245d
SHA256866ffc7bddc25fce1c6e201c4d25fb4979f5a66e712ec5a5863e4135086e3dc7
SHA5121d0dad6dee5d6eaf76d6c00785aad637f055ae5bd5f35d755f26ae2d4c676a93cbccc13b1de71c5f67e7701b39daf4b0ef79a65354f95c1d44ac0c623a5aac2c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5efbd4dfd1e19bbba8b832382f3cd69eb
SHA1b9156248d3ce58666fb5c2f2a61f871f34b89d63
SHA256f96a027319b1721451b4f4be24f3527ca121c3602ff3bf2a9972f860ffb120b1
SHA512b395ee966dd9234b01fad634fe7349c5cde55e23d89429a5d9e9601d82c8111c8e6c3b446c2eba9e726d97b3ce78873e15f05f4883f66ecaee87cb537b79cf1a
-
Filesize
173KB
MD5b2579a04f7ad993aba6b83971e2f5a19
SHA15d1cdfda1cd4fcee62617521e4eeda3fc74caf21
SHA25621344a49f955a523bf87c876d4fe084d68319fd4ad4ddc82ee48840439000f54
SHA512fdc728d6e1283bc844119a632680b770527f9444f6787665032542a0958e895ec72b81450b5775ec19f930fa418f37870580b7d8d36b6b1a8adfa420a0059ed6
-
Filesize
16KB
MD52f07fe702804b61877d6e70d59a6f308
SHA191217a5b16c2f4507e097f99cfdb38ec084c17b3
SHA2566e344ee7de068584adca5373dab48b964a170502b69e9618acc7f343c133efd8
SHA5120b03e4f47e1a185f946abf86168dc0680cb60dce9c567dbb5f266e4ca148c285a3eb5cb70e33e30e985eb3e6ec7484605e6079ac5ba664a4d0e849fc4deea78b
-
Filesize
2.9MB
MD54e9d03c310c265a6a122c4f35a91d67e
SHA1125fc19c342231d77eb9a966885b533e7f1f02d9
SHA2566f58d17894179257ec8a57b947e0129618d099e604e975e6d2e75cc88f48d380
SHA5120c4fee7a590703c8f00e1055ecfbd6abd551f32ab96f0f9254f40891b0d8426ceae488d33ca2d5d342f2b43927011eb9d5e74b42c880a7a7c57fcb49db524413