Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
01-10-2024 22:08
Behavioral task
behavioral1
Sample
337756abc3fa02dfe09bc0e5e1b1d79e044df39d43ab83610ceba38d313ed821.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
337756abc3fa02dfe09bc0e5e1b1d79e044df39d43ab83610ceba38d313ed821.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
337756abc3fa02dfe09bc0e5e1b1d79e044df39d43ab83610ceba38d313ed821.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
childapp.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
childapp.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
childapp.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
childapp.apk
-
Size
1.9MB
-
MD5
13d75db1eb7ed700e84fabbb8b9f6550
-
SHA1
edd021c7020c07140cea7352ffad6837f052f54e
-
SHA256
fed9d6c0afeff04097c2199c37e6813f6b3cfb3f02a43e5dc40c62db70f009ee
-
SHA512
4116e2d1d910f7653e991fe11312e23cab997ae5b695efd7d02ba4d3c1441a8408afe647f508f842baa0208694cf93d63eb5ee4fd09586b28df49ac1c038ee4b
-
SSDEEP
24576:mw36hfeHJyQsh1WuVx6Rq2NxdrmF+wOjys1g/Gj4:Jq1ziNxd2Rs1g/p
Malware Config
Extracted
hook
http://172.27.75.197:8082
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKpid process 5110 com.UDjHbYuSgUQH.snqeOjkYttiK -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.UDjHbYuSgUQH.snqeOjkYttiK Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.UDjHbYuSgUQH.snqeOjkYttiK Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.UDjHbYuSgUQH.snqeOjkYttiK -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.UDjHbYuSgUQH.snqeOjkYttiK -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.UDjHbYuSgUQH.snqeOjkYttiK -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.UDjHbYuSgUQH.snqeOjkYttiK -
Performs UI accessibility actions on behalf of the user 1 TTPs 10 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.UDjHbYuSgUQH.snqeOjkYttiK -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.UDjHbYuSgUQH.snqeOjkYttiK -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.UDjHbYuSgUQH.snqeOjkYttiK -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.UDjHbYuSgUQH.snqeOjkYttiKdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.UDjHbYuSgUQH.snqeOjkYttiK
Processes
-
com.UDjHbYuSgUQH.snqeOjkYttiK1⤵
- Removes its main activity from the application launcher
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
PID:5110
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Discovery
Process Discovery
1System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5f0ba8c098be56c0887e3ed542021cb0d
SHA1104660065badb560e34d863868c93a0c749b429b
SHA2567cf4e845f1df1bfbc5ac610749006f72c7d2d7a0d01a9f15af37696ea20fe70c
SHA51290a1ab1090ec642079af4e40931b182e258f82e38727b2a36c10af437b568f048ef5d0a0819ccd02e49ac5039263f17414123c0138108d806c702e984a41cff7
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5843d669adc5898bcea3f5eca583cc43b
SHA15fcc716d7dd761eb1d00ff05c96e1cc7e7dbb708
SHA256cbc24b605ecc695b80e823bc4a486e80cbd8eba6ddbd825a5ee3fb902c049ba0
SHA5121060a5fac6dea6130f2fb1fce109ee07f17995aff39df2b12f8c7cef60183984184aa6cbedc0502df548a6fec0c295968519c04d4c81729b6a1905838dfda6dd
-
Filesize
108KB
MD586b04c33b786ffca9480942840392898
SHA107c63ad44a4bdcae1d85766f388524a19e9ecfdd
SHA256be6a9c1126ee1c4b2e3d7084815115d9dd4cd0ccfcb5ecc457f692ab73214073
SHA51266af0449fe2754acb6d9f5a37a286d2c5673f372b06fffd2e6eca393ecbd2af0ed6e8490da5658e1f29b92cb98f11f3583dfefe5edcd8492760a2bfa75c735ba
-
Filesize
173KB
MD546284d5b62278e4ac107b1c99f8f103c
SHA1cf4ff5e2b918d495d7cf0e04cf6e51066bc2d115
SHA256a122b57f554cadf7ca8c8be99b6faf75fbe7729af8ffabdace1e5aa9300cddcb
SHA5127bbf8d9ddb0fa52d02d284ba8f1fd44e27af885b82d97049ed72453bbe379339a7b0ddc45e6828f384b7d14bdd8529885831a85d8188707f07ed2b83448c7d00