Analysis
-
max time kernel
27s -
max time network
36s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
14/10/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
excess.undrilled.improper.crushing.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
excess.undrilled.improper.crushing.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
excess.undrilled.improper.crushing.apk
-
Size
2.4MB
-
MD5
eb0ad0b462c65a40c16d43c15cd06aea
-
SHA1
28b0a4559078eac3bd1c06b493c35408e3def804
-
SHA256
136d00629e8cd59a6be639b0eaef925fd8cd68cbcbdb71a3a407836c560b8579
-
SHA512
d5178c83b493999e380b68abc6511ace9c3296393f08bee01dd80582a752fa07a2658bd1d2d0ef3fed01cca9ef17b31c5e5e0c4986ea46ce91a19c9c10e42b58
-
SSDEEP
49152:oRkr6w6JVKUf5wj0FRaVeRyWogZqChiBx1gwxm:V2dJIg7PaV8yvgZnhWm
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4338 excess.undrilled.improper.crushing /data/data/excess.undrilled.improper.crushing/code_cache/decrypted.dex 4401 excess.undrilled.improper.crushing:webview_process -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId excess.undrilled.improper.crushing Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId excess.undrilled.improper.crushing -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener excess.undrilled.improper.crushing:webview_process -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground excess.undrilled.improper.crushing -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction excess.undrilled.improper.crushing -
Reads information about phone network operator. 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS excess.undrilled.improper.crushing -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo excess.undrilled.improper.crushing:webview_process -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo excess.undrilled.improper.crushing:webview_process
Processes
-
excess.undrilled.improper.crushing1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Requests disabling of battery optimizations (often used to enable hiding in the background).
PID:4338
-
excess.undrilled.improper.crushing:webview_process1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Checks CPU information
- Checks memory information
PID:4401
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
975KB
MD5dfde1000d6b51cdc38b21ac5fbaa462a
SHA18389cd13c15f316d55f7909e6ae71f56dfa8ea1b
SHA25609e3db729b16cf271d9be99996334422b372bafaae9ba95f65828c5b2bc97d34
SHA5123f11d6d1c0f4063bb79771834959e8a9d10b7210138fbde88fdf504138ff74c4467b1ca746e341b845ebd10ceb82a122386c1f4f57e2a1ea33f1d51063b08038