Analysis
-
max time kernel
138s -
max time network
163s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
09-10-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
d509b8190a0a0638f2843d5131b889bbd706e1fea92ca7afe9f6d36fa04dce31.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d509b8190a0a0638f2843d5131b889bbd706e1fea92ca7afe9f6d36fa04dce31.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d509b8190a0a0638f2843d5131b889bbd706e1fea92ca7afe9f6d36fa04dce31.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d509b8190a0a0638f2843d5131b889bbd706e1fea92ca7afe9f6d36fa04dce31.apk
-
Size
3.4MB
-
MD5
2f6113bd114d16add9d0a5fda8b9f77a
-
SHA1
5cf070ff727454e2010215546740fa33c4ad42f2
-
SHA256
d509b8190a0a0638f2843d5131b889bbd706e1fea92ca7afe9f6d36fa04dce31
-
SHA512
e57897151222a5b698266b96e7a1a962ff4982eee7385419d647e43f27d0df1d077338f803b34691aabbceb1c7e694623d5e1bff465b4ef0a0a55d0712f2ffee
-
SSDEEP
49152:olkBrgukPnA66MQ6TQFheOPBMldxGIqiuCjpuylt3QbDNXXzcREc9KwRVzLokGO7:oGQPnA66J/qjkiuPjJXj7c8wRFoZy
Malware Config
Extracted
hook
http://89.248.201.43
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.yxsfjxnfs.avkeoizrg/app_dex/classes.dex 4596 com.yxsfjxnfs.avkeoizrg /data/user/0/com.yxsfjxnfs.avkeoizrg/app_dex/classes.dex 4596 com.yxsfjxnfs.avkeoizrg -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.yxsfjxnfs.avkeoizrg Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.yxsfjxnfs.avkeoizrg Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.yxsfjxnfs.avkeoizrg -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.yxsfjxnfs.avkeoizrg -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.yxsfjxnfs.avkeoizrg -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.yxsfjxnfs.avkeoizrg -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.yxsfjxnfs.avkeoizrg -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.yxsfjxnfs.avkeoizrg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.yxsfjxnfs.avkeoizrg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.yxsfjxnfs.avkeoizrg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.yxsfjxnfs.avkeoizrg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.yxsfjxnfs.avkeoizrg -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.yxsfjxnfs.avkeoizrg -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.yxsfjxnfs.avkeoizrg -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.yxsfjxnfs.avkeoizrg -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.yxsfjxnfs.avkeoizrg -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.yxsfjxnfs.avkeoizrg -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.yxsfjxnfs.avkeoizrg
Processes
-
com.yxsfjxnfs.avkeoizrg1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4596
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5bda7cb8932f952def25e3f1198a095d6
SHA1a770ca68717d1f3fa7b1e089ad55ab834ff9ab2d
SHA2566f8a840bac0431d20b98765fa20cf0c8ee792eb31c70a1cfda03a84770f5c3d2
SHA512a48451f24edf81365e9c92e379b7f8a10df376b0128240642204de2e12bad062f9ec1eaf6f647962fc801b6601d313a6d901b1996a1de0ddd46b0fd9598165d8
-
Filesize
1.0MB
MD57a315a420f1455f5a7197a2b88ac55dd
SHA1c89c2bb2c037457969e1747f1e7ffbb5bcd05be1
SHA2560c0cd8185278b34db1d76a4b3c54460a6d2b044bb88308d9de28e38a2e545121
SHA51268a5d990432b9161dcd4ca811919d2c7c725661558ba30413c7347e5144b886d35160c35eba5efe6b273855f60d5aa42de0e24f6380e4d19069fb9163f979233
-
Filesize
1.0MB
MD5bbae5bf3b8d7b3174cd6a68e2b8c91fe
SHA154187229d0fd597ffff8ee18f8668887986e0641
SHA256aecfa3f2dcdf61bc8a2975dc25ca36d1ac811ed583a03451a712b861549fddf1
SHA5127c802bf7be35a2c441b460b500011499b56c16d3b8bb5d021227fffaa6a493c466cf02161bb7dae1fbdef2e7792ba9adc0a02bbf32015654988056a39e2dadf1
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5197a24f3c420c9e02650c6f1a6282da7
SHA16d132d5c45e0c34302e4b1bdaa7e78f79f6e19cc
SHA256898c19684038d384ca4116f5b3f1df36dafa91ef8e7abe365bd4546e8fad43fc
SHA5126e73d4fd825a9f3d1de660b9b87679f069aca4ec63b163f6dcd61a5e1f91e4c22d6c7dac7f0a5bc65395adae81f8ec04aa277309295b6216574b4cb9d230977b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5af1547f725b20d89746b95ea01e46e5b
SHA12c66e3e41f2adf62f2bbff1d6a1a0bf57d73f7ed
SHA25669d438a43cc87704f1834ca28644f1b6f6d9214d64185e65b31e57bedb139513
SHA51254af671fc16f1ed10567faea41c88e32646cfba3ae242e9d7829288ac08aa17afeba083cfc7da883023864dda1a7339703ec2c84c80bbcb81f7118962b406e7b
-
Filesize
108KB
MD56b6a7b55778be96484e77c5fa989b641
SHA140692a25801f858584162107c44b9c41793a9009
SHA2564ec504ecfd689f6c3d81c6c16735adf41a619969c233155a706e2c047f087d29
SHA512e7dca685fecb971efe390ac0c4305f42b7dc7520a5e2aebb87afb02b87bcdf5b1ef2ef3360876703c666ec010bb2248f199f99136ee90b230cc2a8acaf76fece
-
Filesize
173KB
MD51265dfba4d96099565e93d26f105a966
SHA1938df945c67bcede80fc3dbce1bcc4edd0a353fb
SHA256244756e9c1160e4e728013d2ac6a1465b1748563dd9be68950c738f45f39e5dd
SHA512815e44467561272b0182a43af752cbb6ce71b9ac9f6aa9e4d9fc31cada36a7380f3887c51112ed1653483814317259a5911098834f7c4dd51cd4e10308bec01d