Analysis
-
max time kernel
142s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
02-11-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a.apk
-
Size
4.0MB
-
MD5
4711b383734211013cf306a6629a0a1a
-
SHA1
8b4ae329edb16d64248c96b903859fb548a1a7b8
-
SHA256
d68ca0a59f72f29816c91f58ade481658b948c3dbd09592fe29195e54c52347a
-
SHA512
76cd8d0f81ecf20f00cbac7c6a1b96843826753aef724f22d97f04cdf118855ef8aa929a19accc90acc5ab517c1bfcf70f34a5fbabdb300018bbfe0aae08266a
-
SSDEEP
98304:fWOtvSrqZJffEIUESHsuZuKV7D+NtZQ5HTFeHUrV:OivCqf0IUx/YsDCQ5zFeHUrV
Malware Config
Extracted
hook
http://193.143.1.24
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ttzqxpruo.pjlppftclioc pid process /data/user/0/com.ttzqxpruo.pjlppftcl/app_dex/classes.dex 4495 com.ttzqxpruo.pjlppftcl /data/user/0/com.ttzqxpruo.pjlppftcl/app_dex/classes.dex 4495 com.ttzqxpruo.pjlppftcl -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ttzqxpruo.pjlppftcl Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ttzqxpruo.pjlppftcl Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ttzqxpruo.pjlppftcl -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.ttzqxpruo.pjlppftcl -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ttzqxpruo.pjlppftcl -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ttzqxpruo.pjlppftcl -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.ttzqxpruo.pjlppftcl -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.ttzqxpruo.pjlppftclioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ttzqxpruo.pjlppftcl -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ttzqxpruo.pjlppftcl -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.ttzqxpruo.pjlppftcl -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process Framework API call javax.crypto.Cipher.doFinal com.ttzqxpruo.pjlppftcl -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process File opened for read /proc/cpuinfo com.ttzqxpruo.pjlppftcl -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.ttzqxpruo.pjlppftcldescription ioc process File opened for read /proc/meminfo com.ttzqxpruo.pjlppftcl
Processes
-
com.ttzqxpruo.pjlppftcl1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4495
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD58a0b66424df03e24a1020de6fecc99bd
SHA1301a0d9c88a7e9a18241fc8d8c0d77a6a34ebe21
SHA2568e006f4d8711ab649dc09572685a3e602c6604399227b58dd4e3e42a4ade894f
SHA512f7b98d213ef3595fab813d6a70df428eea0ff767cf8a3177dd3de1979ee029d3d496c315b863140c78400eba61b6553614d6208d935b05f19757b82c0822c9a0
-
Filesize
1.0MB
MD53899553dabe203e404e1f7f8e8235c09
SHA110b4cbbedb9a80f7abbc62833654a5cc967911b5
SHA256bcbadd2043710fe22898242f36e097e781ae229c36f5012e4a8f6d0f11912dec
SHA5126687122045145bc1cc9f80998e3aa11e3eb744766bc2c079d826d9a2e8250802e268d8663d5a8dbac3aa4c055f8598d5456cd0d6f22cc74dc2fe420f6e4c159e
-
Filesize
1.0MB
MD5d9d02550db49324b771c8e61b2efa02e
SHA1fb0a35adb6f1eb270811e3af8f004ae63e20f5b2
SHA25629767c8295c1fe8105b2b11f4a3206652ef52b92aad0a980b6ed922bcf8d6fe0
SHA512cc60d54518e9cc8cde7a75508ef582e29092871ab091dcbef51a735f259ab00e147bc09e7013c93b246b3d4784c2270be4c0608b27c6e3e54b65f70c429fe596
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5ab9df75ec2c8e764fcbd74648608bf72
SHA179738f6922899abeb0b05332797d06de050620ba
SHA256c921ed08830d2a4a4fed10c2df4ed440c23f6f23c9d4ee7b9e2a45d3a18f1d2f
SHA512deedb93da976e7f5611c253fa0ebee46559ba62799fee6bf37fa7e0f5144e6a09284b65550f9a2ae44571c87df3a023077d1947ec87fe700a93b585ee75ed300
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD55597aacdf47af00f14575054878a42f4
SHA11b3ec3b063c1d8749152c0bf3f366f500be751bf
SHA2568adf253e705a323769fcb76e74eed4073ab380aafbde98f3380a7509d42e07ce
SHA512c6a0f05d88f5f594078bf18a6a1cfd8360f0861ad6e5292874d638187cec639125e9e555cae13e24fdebc074f96aad24e4944776ccb2f4b670bf4cf60928d9f5
-
Filesize
108KB
MD57005d1e3d73d08295f5e92e827e19891
SHA106bffa0ee55158e7ed00194eaf69474456f832b0
SHA2560d3818848029bb5eb5f984d92d507ed5e39f0e1b9dbf7bf1ec0f9562cdadb9db
SHA512d60179e8d2f1f086cd76b9160c131831d8ff0110246e429a52d7d3072f5146debe68d69b06f28174836e9b6d6e5c92a19a932b33c131e12cb055388fbec13ad9
-
Filesize
173KB
MD572243c34ca6e8a66b378b15c1fcc0371
SHA1d4ab8b7f64a5767fd5d1825c349efc71714317af
SHA2563364d463fa80f70769392632dbefbc93c23e46b219a315e67da951e89bd3f342
SHA5129be3e89a515e69a228b34cfa70a3f810ab2b9abff0abc3ae5b89f56c64f60559251d139d7d2eaefc3236dfc05ba5c58354b69e4d6027304314e9730b5146d488