Analysis
-
max time kernel
143s -
max time network
149s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
09-10-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
excess.undrilled.improper.crushing.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
excess.undrilled.improper.crushing.apk
Resource
android-x64-20240624-en
General
-
Target
excess.undrilled.improper.crushing.apk
-
Size
2.4MB
-
MD5
eb0ad0b462c65a40c16d43c15cd06aea
-
SHA1
28b0a4559078eac3bd1c06b493c35408e3def804
-
SHA256
136d00629e8cd59a6be639b0eaef925fd8cd68cbcbdb71a3a407836c560b8579
-
SHA512
d5178c83b493999e380b68abc6511ace9c3296393f08bee01dd80582a752fa07a2658bd1d2d0ef3fed01cca9ef17b31c5e5e0c4986ea46ce91a19c9c10e42b58
-
SSDEEP
49152:oRkr6w6JVKUf5wj0FRaVeRyWogZqChiBx1gwxm:V2dJIg7PaV8yvgZnhWm
Malware Config
Signatures
-
pid Process 4925 excess.undrilled.improper.crushing -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4925 excess.undrilled.improper.crushing /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4925 excess.undrilled.improper.crushing /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4964 excess.undrilled.improper.crushing:webview_process /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4964 excess.undrilled.improper.crushing:webview_process -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId excess.undrilled.improper.crushing Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId excess.undrilled.improper.crushing Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText excess.undrilled.improper.crushing -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener excess.undrilled.improper.crushing:webview_process -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground excess.undrilled.improper.crushing -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone excess.undrilled.improper.crushing:webview_process -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 2 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver excess.undrilled.improper.crushing:webview_process Framework service call android.app.IActivityManager.registerReceiver excess.undrilled.improper.crushing -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo excess.undrilled.improper.crushing:webview_process -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo excess.undrilled.improper.crushing:webview_process
Processes
-
excess.undrilled.improper.crushing1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4925
-
excess.undrilled.improper.crushing:webview_process1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4964
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
975KB
MD5dfde1000d6b51cdc38b21ac5fbaa462a
SHA18389cd13c15f316d55f7909e6ae71f56dfa8ea1b
SHA25609e3db729b16cf271d9be99996334422b372bafaae9ba95f65828c5b2bc97d34
SHA5123f11d6d1c0f4063bb79771834959e8a9d10b7210138fbde88fdf504138ff74c4467b1ca746e341b845ebd10ceb82a122386c1f4f57e2a1ea33f1d51063b08038