Analysis
-
max time kernel
149s -
max time network
153s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
22-10-2024 22:14
Static task
static1
Behavioral task
behavioral1
Sample
699d589e1470d40cc02a1880dab4a4cac24f681096b200d4871fe3c6807337ce.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
699d589e1470d40cc02a1880dab4a4cac24f681096b200d4871fe3c6807337ce.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
699d589e1470d40cc02a1880dab4a4cac24f681096b200d4871fe3c6807337ce.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
699d589e1470d40cc02a1880dab4a4cac24f681096b200d4871fe3c6807337ce.apk
-
Size
3.8MB
-
MD5
a8ac839b76d0fbae5c83fedc18a0fc46
-
SHA1
75ab8369c36851f6bbb15e47581d96d9192e2488
-
SHA256
699d589e1470d40cc02a1880dab4a4cac24f681096b200d4871fe3c6807337ce
-
SHA512
0b62f778ad02a92fc9007ef1552432ebdd2510f99eb4852d1e31c69c29877a3fc943f1918b0338fe03df609f91dd9c3569ae21b787d6034c28f62ea618983606
-
SSDEEP
98304:0V+Spd1dyQhQEsnumInt8oHHgYMbIXbnsVHrFe7:/SpdSQh+/cDiijaw7
Malware Config
Extracted
hook
http://negroti5k3fa.info
http://aprilka21jfa.live
http://mishao11jfac.pro
http://vamir99ffkkd.info
http://prebadejf41vv.live
http://hopfvba01fv2.pro
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex 4322 com.fswdooiiy.cmmlmkjde /data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex 4347 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex 4322 com.fswdooiiy.cmmlmkjde -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fswdooiiy.cmmlmkjde Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.fswdooiiy.cmmlmkjde Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fswdooiiy.cmmlmkjde -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.fswdooiiy.cmmlmkjde -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 api.ipify.org 13 api.ipify.org -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.fswdooiiy.cmmlmkjde -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fswdooiiy.cmmlmkjde android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fswdooiiy.cmmlmkjde android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fswdooiiy.cmmlmkjde android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fswdooiiy.cmmlmkjde android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fswdooiiy.cmmlmkjde -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.fswdooiiy.cmmlmkjde -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.fswdooiiy.cmmlmkjde -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.fswdooiiy.cmmlmkjde -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.fswdooiiy.cmmlmkjde -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.fswdooiiy.cmmlmkjde -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.fswdooiiy.cmmlmkjde
Processes
-
com.fswdooiiy.cmmlmkjde1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4322 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.fswdooiiy.cmmlmkjde/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4347
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5bfec9b0c3f2bba39d0084e56786f7578
SHA11caa527bab6520858df835250f0793285828ef06
SHA256c3937c8231f0fc95c1650753d9d4bbda0cdb117bbd5ed76d70b029d06efa7542
SHA512156e9c71a4540a722cefd65bcef0aa4a94071addad650e6dfca5cca8147eba79d59178263f7f3a9f27865fd53b7949b04a8c7ac7a556d53478753a942f642aec
-
Filesize
1001KB
MD5f09b81a97759ae30633f34306a74e70b
SHA141750c4a083633234414b618df68f4dd9812993f
SHA25601cbb7e5194b3e759cd4e12905f53e02d9f069cae83225877fa008d4ad9a42bf
SHA512676b5be3a34ff76c538ee9427aa1ad77520fb90956b61e6f07f6b753aaa583bfdae1afe942b5569e07ed37ff2ba33f0c368fae3a7d38926a97e15a4af8cb1df4
-
Filesize
1001KB
MD5ab4ff79224a3356923bdf52a28b9366c
SHA172992ef16e44f4949c685e5ca6bd645d152d6da0
SHA25638c4affa1998922818f3500b772c5a6f9c1b0966745ab90da036507a32fd8399
SHA5121ebc21bd8f814e720700dc16ba4a9070a6506bf1fd74d854da8006d465611e4034bb3a1b38204fcea34fd8c1151505f6af09cc0a54fca91c274a6e54cfabd605
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5d5eeb8110047697f5afc42056dcad9d9
SHA164ddda8178879ffef05275391a639281b518290b
SHA25613a773957d48955054aaff8afce85fafd035bedd1f4abb597f0e941e5cca3f7c
SHA51265da00eb45416b4e4678f33bc3e2c2e032bf548fe83f2e746ab81cf8698e8c679303de6b6762b6d3f711bd518a6b2a054a6c5d9d9e23537a328a787fff4c14f5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5bc8fac3ca60b5fdd448c6ffeb6c3d77e
SHA1b9296ae5b494b25b7b387deb407aa079171a7c3f
SHA256ad8569cbb88b1a572987f79b87c204c3fed6c98d8aea446569fcd05d9de8c9c1
SHA5123075cffc5a9b23222ceccf7fe707a91569a6c5607c6486cef0b1ddb083eab34ea1204f58eac0d16a40a4ca13b50cd965f9598568f94061a888624f597a6d0269
-
Filesize
173KB
MD518ebb985c57f3ff6cb1eb36157c2e5d8
SHA1273b7f25f6916191cbc1e9dcc3c6a96dee3dd68f
SHA256fbcbab75ab21de8848cf828020126c9baea8324dab86e87ccc988a42489e2cfb
SHA512ba210b5cb9890170ce4cc2a17961a2e180bb1a52a5f065be60c7ad16d618013c30c490b537261be8d3db50241783a2d263a37acfeb282c8a454050b14357cbce
-
Filesize
16KB
MD5d8b80bf387808a2e42509f1d18e24e32
SHA1b01864bb071b73867df2eb4238d69fb861d67670
SHA256201e89fc1585a439f5f96f4fd3278d01e2718632e7a7be5cb89e692e5e19fc22
SHA512bb94beca122f0b9ac7ee27eca6b89471bff5faef814447e3ad5ea78adfd20c2ec975364faab8145fdcf7feda85546f23b93da62e8a4cb45a8f8a4abf3cb86b4d
-
Filesize
2.1MB
MD55a243cef26d8f2c7be5d1e959abde591
SHA1e612591f90b7481801f4cdd049e163bec076ffa0
SHA2565b829129a4054e59de2b5314956c799d3c6393941231155670db8d1be5512841
SHA5125233421a61706a545ce0d70a702d7c869aacb1ea0eda15a895ae102c160fa9233fa9319242ed2d0f7e28a7f1dbc3cb9464671a29fe1f808102c3fee88c02739a