Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
20-09-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
3463bba03f7462cf23da29831ce69643a895c0925b3bf46a596e99f92020485d.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
3463bba03f7462cf23da29831ce69643a895c0925b3bf46a596e99f92020485d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
3463bba03f7462cf23da29831ce69643a895c0925b3bf46a596e99f92020485d.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
3463bba03f7462cf23da29831ce69643a895c0925b3bf46a596e99f92020485d.apk
-
Size
4.8MB
-
MD5
db81b2219bdfb926428a8186b7d2ea56
-
SHA1
83f36d09723151c1480361cdf1c57dd24aff0bdd
-
SHA256
3463bba03f7462cf23da29831ce69643a895c0925b3bf46a596e99f92020485d
-
SHA512
7c15df9fcf38e605cf147b4ef65acf0dc1063d2f6ba5ac92f1a842197fd0ddd714dc7e6d0e5a75ae4d22a6f16e7d26e5d0ec8518e10411751c0afbd2a5130d76
-
SSDEEP
98304:N+M/s+sJjmALGRiUXb1MK+bemf6wsbHok1Vm7z6oNNsV1OUmT+DEHAytd0EZLFk:Mh+2pizXRM5LNJgnoQPO7K5ac
Malware Config
Extracted
nexus
http://109.206.243.54
http://109.206.243.55
Signatures
-
Nexus
Nexus is an Android banking trojan related to the SOVA banking trojan.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.machine.easily/app_DynamicOptDex/Tdt.json 5070 com.machine.easily -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.machine.easily Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.machine.easily -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.machine.easily -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts com.machine.easily -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.machine.easily -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.machine.easily -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.machine.easily -
Performs UI accessibility actions on behalf of the user 1 TTPs 12 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.machine.easily -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.machine.easily -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.machine.easily -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.machine.easily -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.machine.easily -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.machine.easily -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.machine.easily
Processes
-
com.machine.easily1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Reads the contacts stored on the device.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:5070
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD566847dd8909c63e501f5accb10f603da
SHA15b6c9f9d331930f62c9ce153899869929693a8b0
SHA256c0d4c929866bcbf89bcc243561f9f3d8501ecb28aa7cb3dffcf5d401f0c0d64a
SHA51268722fffa54d8ae523182ec9af8457996bd8d07bba1cee097d9ffc6ee3f4b8542bf8d7a7529c7c91eddd792fec7282b9ceab2006ae19b716c554c6b0dcfe0033
-
Filesize
2.2MB
MD5359ac4212288a3b52589868734d75fb0
SHA10fab0b48260b1acc7aab74fcc9bfa0d0302a2292
SHA256c91eeac469d2f41f06659edda118f739b44d2b10321dc7d294c77fe4846815f8
SHA51206b61216ab1bb43d3b4aae2f26062ef7987a4c128b493f5b93f224cf2dd063760c40b21bed0b1e5046f4e416bce86d5f312304bbd663b01f73a603e6dfd4fe9f
-
Filesize
6KB
MD5a539c342e8a648312a14406ac44bb414
SHA1de8a8911f19bb4257a132a14a20b35923502afc2
SHA256ede11b832436e704f191f90214ba48b515d4021501efd90819c73345bda30e82
SHA512bb9004b2ee53802d0f70a5a06923fc6776335a22a136399168096d7fd9d751f282edc96c52c2d4a8f51355447dfc9057c963f217c50dfc94f27cb070a560ea3a
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5327d519a8ec873ee249b5e20fb0bd417
SHA1f195f0d02583d35d30772fbda5add6209493af3c
SHA25643039e0f7d7a970e725d19538c91ae89a96563dafbde500e72712d6bf9b5e841
SHA5121b146d988f803bde164eb89caeef2255b79432ede8b1b122b963734fe204cdf51af3bd01f65b731187b230f97b8828d70fc4f0663de76543eb879463ac6e3a8f
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD56c28a47a50e9786ca375e6003c9ed265
SHA18612b3bcdab8559a393f0ac3674e2ba12933c674
SHA25669bbcb62333b3f993720878cce16e98b01755d4e5a2e13e38b53c9eb88522d06
SHA512e9da799d72497af7ac8af0e7750550ce4aed74cadcae90e8c05798ae84e6ed54e6907ad51886214c3b6bb43180a3cfd8c20caca6a1ddfb88919a388d239b2a0d
-
Filesize
108KB
MD5dcf1d5b8bae7be2e8f07a62dc3e41dda
SHA1e30372d27608f2122e3f1d1a8a6ce6d52d5b62e5
SHA256da227b9cc89670a71475d2860008c38ad5408412722e88105247eeb656aff4bd
SHA51225b236bc0e2502d215e5576c2b3db2213531257589404a5b7df3cd2b152fe7026e3454e1002a18bd67d9f2e00f975c258030c2958b9bc71a26444d69ee9c3cac
-
Filesize
221KB
MD5db9263a2f1d3492316d68afd4b560dfc
SHA188f15698a5ba6f4376fa6ee6cd7c3962390af57d
SHA25668493fb2dcd5f57ef33a099fb1dfa7730fa922cb92f24f1cc8e2c16354d9642b
SHA51212a1697a0baa0580da3895bab92079116c967ea7d9381e2c69741625e2b57aadb41fdca56524cfc8554b7c4cf578b1f6e2d72bfd31a7f09095aff70aaaf74590
-
Filesize
6.1MB
MD50c1db3674754c44e368139d9563a5632
SHA1f14d6c43da9158fbb817a7becd460897f8ad483e
SHA256cd7e5696a7eae1f69df25d0617dc87696880ebf83a64cd1920cb4051e5e30c8a
SHA512252d15da07d538b4cd6dcc3f91b00770e71af6762b3337800f43f9da2afc59381e626704ea3d62ba43eab0d60a99c4f6930daeae017860aeec1be76f5a52307d