Analysis
-
max time kernel
140s -
max time network
161s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
18-10-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
ef1daafc0832d8c6bab1f6009d57531dc7a00831bbf1afddd16d8b898bf241c5.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ef1daafc0832d8c6bab1f6009d57531dc7a00831bbf1afddd16d8b898bf241c5.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ef1daafc0832d8c6bab1f6009d57531dc7a00831bbf1afddd16d8b898bf241c5.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
ef1daafc0832d8c6bab1f6009d57531dc7a00831bbf1afddd16d8b898bf241c5.apk
-
Size
3.9MB
-
MD5
dd7667c44e4b076202bcd97d1cd0c5b6
-
SHA1
8bd5538d21acd6a24fbf31517884ddfa6445b170
-
SHA256
ef1daafc0832d8c6bab1f6009d57531dc7a00831bbf1afddd16d8b898bf241c5
-
SHA512
88ca4158e369608ca4f49f9d1459d2fa7c5c7a9503dca45ae4841471214dcd5538d244e019b7c0258425bfde21f7c7948e1cf003612a6d5fb129bd63294bc797
-
SSDEEP
98304:oZ2RaXyHSPhPlxtRJYR4pRWlaI9dyj7xUKObtajrjyj8:eryyP91YaVsUHxUDajrjyj8
Malware Config
Extracted
hook
http://154.216.20.101
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.neasqhpqv.isxurogfu/app_dex/classes.dex 4516 com.neasqhpqv.isxurogfu /data/user/0/com.neasqhpqv.isxurogfu/app_dex/classes.dex 4516 com.neasqhpqv.isxurogfu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.neasqhpqv.isxurogfu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.neasqhpqv.isxurogfu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.neasqhpqv.isxurogfu -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.neasqhpqv.isxurogfu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.neasqhpqv.isxurogfu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.neasqhpqv.isxurogfu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.neasqhpqv.isxurogfu -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neasqhpqv.isxurogfu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neasqhpqv.isxurogfu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neasqhpqv.isxurogfu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neasqhpqv.isxurogfu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.neasqhpqv.isxurogfu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.neasqhpqv.isxurogfu -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.neasqhpqv.isxurogfu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.neasqhpqv.isxurogfu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.neasqhpqv.isxurogfu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.neasqhpqv.isxurogfu
Processes
-
com.neasqhpqv.isxurogfu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4516
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5a66e283d6f2d2502e2502b856666d2a5
SHA16a9e6a66f892dddf8abcc9c9f92c8ec4bbf3c434
SHA256a624059c5a95732186b106eb69d5d74247652d9c7496fea650cb773fc04233dd
SHA512096e19c29f20810d90f36a0845147611340aa3353d89d9a17333d9075eb519ab5d595cd89b14baf55d11393ddcab80db2b3d508a5e100c42d5bfc7e7bd659ac8
-
Filesize
1.0MB
MD5f321641b80e1b8bab465d6502e74c39e
SHA18963bf1c03ffda671c23d7fd1206d868baa474d7
SHA2564c1620fa0fb5232b414d729536ac96fcbc3eb78ac858c6305ee657192b15d1ba
SHA512255edc3fb76c8e83881665ae39db86ef84380ac22a361e9d47d064754fa14d371d07a37672b53588d4bec34581b40331a2199c8bfd423951d2a8070adf18e957
-
Filesize
1.0MB
MD554aad71b69fd0dea398ab5950b2b09be
SHA12c24f45c975335c85dfe8cf18d694fdc124e2360
SHA2565c5d3f2e6e0cc2188e645bde8ea79a4d092deea03d00f30a38281c597b6ada7e
SHA512cb73d76a6fd650470e28ca5f2bb6283d2335d1a0b5e03600310f9c2ae1f6157387d5e0364df238350b9724d7b9cd71cb00f8cd7473d294d8bb02d0ccb7699cf0
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5c33127389d9e040773692566d44c7746
SHA1ba00dd29e77d9705ec5ba8447572217b9a285a1b
SHA2564f816efdf8225f976e0e2535e7d45e451ebaae431f9c5d0675216939b7a48d55
SHA512579193ddc4e922e88df5a377e9d3c22b38ebe3fe23c160ad9381b8ef5a8052c48672dd103da113ac95d2c4fdeb38f0e950ce008e7ecbd28b92e6d8500220ea27
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5aee377ec274aa2dce08da187a3ad241f
SHA1dd2c557a6fb0faaa20a82f1bad0d7f29f899c71d
SHA256b464a5b2d23c6e88c01899673f873e1272f967c2884266a71d65eb91d72587dc
SHA512994ea41d847588e042126d7250d4265ca4a4d4b03ffcbd355c76c9cbe604652bda3955a69c62d39d6b7d495f2d2b87bcc99cf96c7fcbf46f24cf361a17f4e4eb
-
Filesize
108KB
MD5eb673988e278fdad44a09cebc75aee2a
SHA1e858b2e3eefaad26dc3dae887ed5ae9bbc628566
SHA25676b4860a6e6d90abeae8aabc7b989f998f48a77bee498f05b65b2ddcf7cfe93d
SHA51297f687809c3377022a105db4a396acbe2652df7e36275843a4ac7b38b20b9af649bddbea327b541868c9f4e5bceed18327753c2acebb52b295115c258618754e
-
Filesize
173KB
MD5c38211618f6d5b3ed12ea421d7e866f7
SHA1c722d4dfe4d7924a33d76882ccb6565de22071ce
SHA256b307217249a99b6a74607ea721b1cd2dbc7cec40388019d594c18ae2e88e13cf
SHA512275f83a86f1b0c2ffb820e37a25b8bdb00659519043c95ba20747596970b8851faae2c628d0e321256e60a79c503513b69555298eac9a5c5a4ee92dd63d201c8