Analysis
-
max time kernel
149s -
max time network
159s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
02-11-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
-
Size
4.0MB
-
MD5
4711b383734211013cf306a6629a0a1a
-
SHA1
8b4ae329edb16d64248c96b903859fb548a1a7b8
-
SHA256
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a
-
SHA512
76cd8d0f81ecf20f00cbac7c6a1b96843826753aef724f22d97f04cdf118855ef8aa929a19accc90acc5ab517c1bfcf70f34a5fbabdb300018bbfe0aae08266a
-
SSDEEP
98304:fWOtvSrqZJffEIUESHsuZuKV7D+NtZQ5HTFeHUrV:OivCqf0IUx/YsDCQ5zFeHUrV
Malware Config
Extracted
hook
http://193.143.1.24
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ttzqxpruo.pjlppftclioc pid process /data/user/0/com.ttzqxpruo.pjlppftcl/app_dex/classes.dex 4977 com.ttzqxpruo.pjlppftcl /data/user/0/com.ttzqxpruo.pjlppftcl/app_dex/classes.dex 4977 com.ttzqxpruo.pjlppftcl -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ttzqxpruo.pjlppftcl Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ttzqxpruo.pjlppftcl Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ttzqxpruo.pjlppftcl -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ttzqxpruo.pjlppftcl -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ttzqxpruo.pjlppftcl -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ttzqxpruo.pjlppftcl -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ttzqxpruo.pjlppftcl -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ttzqxpruo.pjlppftclioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ttzqxpruo.pjlppftcl -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ttzqxpruo.pjlppftcl -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.ttzqxpruo.pjlppftcl -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.ttzqxpruo.pjlppftcl -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework API call javax.crypto.Cipher.doFinal com.ttzqxpruo.pjlppftcl -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process File opened for read /proc/cpuinfo com.ttzqxpruo.pjlppftcl -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process File opened for read /proc/meminfo com.ttzqxpruo.pjlppftcl
Processes
-
com.ttzqxpruo.pjlppftcl1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4977
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD58a0b66424df03e24a1020de6fecc99bd
SHA1301a0d9c88a7e9a18241fc8d8c0d77a6a34ebe21
SHA2568e006f4d8711ab649dc09572685a3e602c6604399227b58dd4e3e42a4ade894f
SHA512f7b98d213ef3595fab813d6a70df428eea0ff767cf8a3177dd3de1979ee029d3d496c315b863140c78400eba61b6553614d6208d935b05f19757b82c0822c9a0
-
Filesize
1.0MB
MD53899553dabe203e404e1f7f8e8235c09
SHA110b4cbbedb9a80f7abbc62833654a5cc967911b5
SHA256bcbadd2043710fe22898242f36e097e781ae229c36f5012e4a8f6d0f11912dec
SHA5126687122045145bc1cc9f80998e3aa11e3eb744766bc2c079d826d9a2e8250802e268d8663d5a8dbac3aa4c055f8598d5456cd0d6f22cc74dc2fe420f6e4c159e
-
Filesize
1.0MB
MD5d9d02550db49324b771c8e61b2efa02e
SHA1fb0a35adb6f1eb270811e3af8f004ae63e20f5b2
SHA25629767c8295c1fe8105b2b11f4a3206652ef52b92aad0a980b6ed922bcf8d6fe0
SHA512cc60d54518e9cc8cde7a75508ef582e29092871ab091dcbef51a735f259ab00e147bc09e7013c93b246b3d4784c2270be4c0608b27c6e3e54b65f70c429fe596
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD524143479e01bb1f0f277a11e70ab72f8
SHA119ee30933512c39609c64fdf0b06c2f8ffa622d1
SHA256aea303094b263cb6f1590c5e2c155ee92861ac20cc4a49f14551940f0cea9fbe
SHA512b2483545d5b00edb15d80b1502b74432b714f317e577e2ffcdabdd049bcc9e8a77b5e321a5c65ecdfb2bbfa55a7bf6913b933d62d5cb7d3d7c10309595bcb6df
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5c33be807e42a11c268c9c05734942b0f
SHA107eb803cd761390d53265e942569d91637d47c5b
SHA256503893c292efa69f4765d6639a8c52d2463cde798eaf74c03c1bb6549914b633
SHA5125ef7903a7ffae6d3638ed44e7c1f261997e527f5e5dd7b9e0c03ce3a08e3445d91fafb212a07b2f7099070ac94464b966230ea60527e80c7f36abcef3c97feff
-
Filesize
108KB
MD5deb7bfffeabbcef3ccdc06276d64d39e
SHA1894d8298b23707c6dfd7b2325e91aec4dbb4adef
SHA256913e44e156d95e15264f8d8e346e7ca78ca9e89456cf01f72c3c1b4520c0a1d7
SHA512a337a72ea7c18c3b790dac2415f838c93cd7845aafca7b334303fec268559243de9fd072ae26bbc0afb2567919e2f2863a97ebe01cd8648f0391f81fec61bd2e
-
Filesize
173KB
MD5746ce5beb3f05dad9bcff989b580573c
SHA1cf588c415f5edd002831d3759420d6b1168c75f5
SHA256719c876204d0b3271340e8834cb4811df36d0c8af12c0ba7d4f53644f83ad127
SHA512c25ef0e1a8134a3125ea680bb68469268854c95fb133a0a9232012366003cdb76bec2b8d23b771558b1646bc6809df96d1f355a4bb7b40f510a5655a7cf8ae73