Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
29-10-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
03a9af067118dc7c5d9df9f0cf669f2f92f7722063afa7a51580e35702d86182.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
03a9af067118dc7c5d9df9f0cf669f2f92f7722063afa7a51580e35702d86182.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
03a9af067118dc7c5d9df9f0cf669f2f92f7722063afa7a51580e35702d86182.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
03a9af067118dc7c5d9df9f0cf669f2f92f7722063afa7a51580e35702d86182.apk
-
Size
4.0MB
-
MD5
cf0083caba824a7d09686e4257ecedae
-
SHA1
aaba79566f991dac52008c46c2c4949acd71f781
-
SHA256
03a9af067118dc7c5d9df9f0cf669f2f92f7722063afa7a51580e35702d86182
-
SHA512
2154574a5679b9e9f23aa6efb3ffabd4060df14ade2ade42342d6cb63a8b3a425de72245dde4a497d6b5b9492ca7d9d984c8c21c59a4a7174375f9855bad1961
-
SSDEEP
98304:GFnW/CGiMLz5ECkw7gO7/0ymv1rgaJWiSDwhUq4+hfBi:+iLVEoz/Mv1ca4lwhA+hg
Malware Config
Extracted
hook
http://193.143.1.24
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.krhizmubn.uunuofzilioc pid process /data/user/0/com.krhizmubn.uunuofzil/app_dex/classes.dex 4596 com.krhizmubn.uunuofzil /data/user/0/com.krhizmubn.uunuofzil/app_dex/classes.dex 4596 com.krhizmubn.uunuofzil -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.krhizmubn.uunuofzil Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.krhizmubn.uunuofzil Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.krhizmubn.uunuofzil -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.krhizmubn.uunuofzil -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.krhizmubn.uunuofzil -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.krhizmubn.uunuofzil -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.krhizmubn.uunuofzil -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.krhizmubn.uunuofzilioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.krhizmubn.uunuofzil android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.krhizmubn.uunuofzil android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.krhizmubn.uunuofzil android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.krhizmubn.uunuofzil android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.krhizmubn.uunuofzil -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.krhizmubn.uunuofzil -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.krhizmubn.uunuofzil -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.krhizmubn.uunuofzildescription ioc process Framework API call javax.crypto.Cipher.doFinal com.krhizmubn.uunuofzil -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.krhizmubn.uunuofzildescription ioc process File opened for read /proc/cpuinfo com.krhizmubn.uunuofzil -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.krhizmubn.uunuofzildescription ioc process File opened for read /proc/meminfo com.krhizmubn.uunuofzil
Processes
-
com.krhizmubn.uunuofzil1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4596
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5f1a48d7ecca85b7082923faebcb751dd
SHA132ae30387a0f21b0d2807352a3004b7466bfba7f
SHA2566d1cd1b0ef318d9fca619ede30c2357e9225262c2707e8599c27239df2617af1
SHA5128622ae5d65bd4dfc6be7ce2969cb17660b70e8ee64c470e467f945697f766caa7a1fa9ac173058dc24631389bce779d1b5d150b6c75b1bcc0fec0df56afcee2e
-
Filesize
1.0MB
MD5f256da0b63ad75ce9f41a64239dac69d
SHA117658fb19c05552bba53fae94261dcaac19b4dfb
SHA256291350d7b29a9c2bf8777f131e48c68f8f14f8725112849990c554f0c6e8a776
SHA5123627cf64ff122e292002cbc10abfd508ca435f37504aae9999cac905b8b72ada64739aee1fecd32dbf8c7bef9d82699ba6d64cc55d83f6e3cf87e933942e2f62
-
Filesize
1.0MB
MD5541182d66aab841aac1445942870214d
SHA12d6c765ca777527a4c9b6c6c9e44317656c0c054
SHA25619fd41d28d352bed10bbb997b5c2752d0f9def1036d5b12394fb189e0b6c22cd
SHA512274719d79501d7e1a83f77ab1b85dd850be785db73435982897085f5f0e9864406dc9d24e014cd2379cc31a3df708d7b2acf243075ef4eb9696aa41b838277f4
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5fabfa5ac3c9807c6bed979889a3cbd24
SHA1ec6e18ec8bb3915394ca2284ef732edb27deaab0
SHA256baabbf14746911f23b2d5ef9d5f06481c42b66a557587d945edbdffe90cd08ab
SHA51262bb72cfff6e9180845e62afe20f6ac4587775c5b008fdef2100034de48ae314ca7780ae66f003fb2774b8cde05f42ce01befb6f031f6b23dfd12e6e536090e4
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD55a8dcaa99528a860fcf08848ac47db1a
SHA1f98822ff0829fa29c2b9e805ec75cca68711638f
SHA25686feebcddda56a135e9d0804cd6e5afa6818f9a81a916749e975f89e414e9ff2
SHA512bfca227249024b204530a230919d851b713e4c109ec7094eb3a6e380db173631541d97599ff22c6cbe73ed796dfa2ccdbd96e23d456bf8f2e8800cb81762f6d6
-
Filesize
108KB
MD549e4566c57858ef276a93176543b94f7
SHA15abcadbb0d14449d7061086923be7f2d7296966e
SHA2568b89b99552ada0bb7c4b239fb4ca241c3b4a9b629402fb8b1103dbbcf08c42cf
SHA512deb40b7091bcc4b4c3a6d881e94f9f19792b6119c5572b624e2bbe471c0b86142ce38e1a7c91dcd16f9eb7734fa0e390d0e27d1f2a6662520117fec1c39c74aa
-
Filesize
173KB
MD56055446e4e28dfa36314e3a6f25f9f3d
SHA1cb45b48dbea9ea3e5f073715e1df377d60b69edb
SHA25684d49b45bf8170f795056fb10f220c695241e12dfbd8429527ed24fa5198ccea
SHA512579d2f395d8cc6d687e2c45ced7249e744d8f7a9ef0322bfd190f4e3c7afe52656da65e1382ed014e131cb72b5dac05fce3dd521d4ad9fdcb51219951c4bca9c