Analysis
-
max time kernel
143s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
04-11-2024 02:25
Behavioral task
behavioral1
Sample
6499730a01703cad20711803829862f3d19ee7a3fedbe72fea2f319394b29627.apk
Resource
android-x86-arm-20240624-en
General
-
Target
6499730a01703cad20711803829862f3d19ee7a3fedbe72fea2f319394b29627.apk
-
Size
21.8MB
-
MD5
c7deaaa7fece968cc24461261302cf15
-
SHA1
4e6fb0d472c206304f534cea438a57970b050908
-
SHA256
6499730a01703cad20711803829862f3d19ee7a3fedbe72fea2f319394b29627
-
SHA512
d988f0fc9fa905c6c38c2248445190bdab31a48d074fb9ef3cf4efc4a26879e1a6ce6b1d7906f660d49884a20218569d9e26f9af1a49b04ad91628726de2ece7
-
SSDEEP
196608:UH9Tk1h3dBQlogWNJs1sgAXFNgI7a7YSu33Zu9yzhLrZOOZ3mJB4iyyVbUr8hCLV:qkFTss3FNgIuc9zhL9XZ30Fknx
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1ioc Process /sbin/su com.anydesk.adcontrol.ad1 -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.anydesk.adcontrol.ad1description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.anydesk.adcontrol.ad1 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.anydesk.adcontrol.ad1description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.anydesk.adcontrol.ad1 -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process URI accessed for read content://com.android.contacts/data/phones com.anydesk.adcontrol.ad1 -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process URI accessed for read content://sms/ com.anydesk.adcontrol.ad1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Makes use of the framework's foreground persistence service 1 TTPs 2 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.anydesk.adcontrol.ad1com.anydesk.adcontrol.ad1:remotedescription ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.anydesk.adcontrol.ad1 Framework service call android.app.IActivityManager.setServiceForeground com.anydesk.adcontrol.ad1:remote -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.anydesk.adcontrol.ad1ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.anydesk.adcontrol.ad1 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.anydesk.adcontrol.ad1 -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.anydesk.adcontrol.ad1 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.anydesk.adcontrol.ad1 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.anydesk.adcontrol.ad1 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.anydesk.adcontrol.ad1 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.anydesk.adcontrol.ad1description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.anydesk.adcontrol.ad1 -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process File opened for read /proc/cpuinfo com.anydesk.adcontrol.ad1 -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.anydesk.adcontrol.ad1description ioc Process File opened for read /proc/meminfo com.anydesk.adcontrol.ad1
Processes
-
com.anydesk.adcontrol.ad11⤵
- Checks if the Android device is rooted.
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Reads the contacts stored on the device.
- Reads the content of the SMS messages.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4244
-
com.anydesk.adcontrol.ad1:remote1⤵
- Makes use of the framework's foreground persistence service
PID:4444
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
3System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232B
MD50713e56c9666746560c6823b57b6f25e
SHA110069f39968a75683b3a18cc72d413ae1e7b75ce
SHA256d77c925f2b7f2d377c0356f39ce09cef9d30240ec6e551f16655f223e6e14cdb
SHA51276b7d5f05250f37b2c97fbbed07f0fea872a9ccb05f7b005a5d002601d3e9ded4283696598829ade5375bb3ec264a37e4a2d743f28859e913c52b596c2c74b87
-
Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
Filesize
143KB
MD55dc1983554a88c2a224ee046bb7314ec
SHA15b09273776014bf32fd8aa7bca9ce151d2c7d98f
SHA2566a4d32e8ef673e70a8a4963124417be10eb09089f3aa049e1e3c7de515c69f21
SHA5125ce30ef36c25d33f3416006c103608057a9cc88f2d88fe37de3bd895d68a005644d74aca0abd5bef02f2ed17709a38ae249b0dabeaa16d1c46c8a8c9d85c7e88
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5ac3ef276c2710a69d16410340e3d1198
SHA10c0a6c297d8757ed7f1bc47e32dbc9bb8d7a30e9
SHA256d7f391ea10be1d5479e3bb6ba1489bfe39ee1a20b43f3db9fd4da2f51fc51f2a
SHA5122adbbd51c648fd04486a7fee433ed79baea31276080867ac618c44f62ebc53d2b27d3a4eb677681ecd7c0a0453511ab998f88eead628b8da549b4293a11c33d3
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
88KB
MD5f21edc458378a33527ec4ff928f54a56
SHA1586a28d300e4bc2fadc3047f40e9d88867a591f2
SHA25641d321af77096f78a4d46d1fe5ba7228643191c79a853a8253767170cd7bd2f7
SHA512bec990f0636af1297a7ee69dad2ced7b02686c7789fdccefb2885c713e6308f7fb6dc7528daa73ad24051934e349a48df4d2455502e18afb09226428f40cb0ed
-
Filesize
13B
MD50c23697ccfa98f4cc2a278e02cbc6a24
SHA122c2c83f489f18b2552a6a0e90de782ffbdf97a0
SHA256fe38f04bba90a7258f5d94d3f549c30cfeafd30802178a33d57bb832358a28e9
SHA5122fdbca3b6be02c18a9c6ef43ae76cfe733b5369dc7c17fa6ccf3b9d6c38dda3d5ff1dd59f5fef32dcbfe473f4ffa7c1bae53cb375493b5d7a6a13ba998c623fc
-
Filesize
4KB
MD5620f0b67a91f7f74151bc5be745b7110
SHA11ceaf73df40e531df3bfb26b4fb7cd95fb7bff1d
SHA256ad7facb2586fc6e966c004d7d1d16b024f5805ff7cb47c7a85dabd8b48892ca7
SHA5122d23913d3759ef01704a86b4bee3ac8a29002313ecc98a7424425a78170f219577822fd77e4ae96313547696ad7d5949b58e12d5063ef2ee063b595740a3a12d
-
Filesize
24B
MD5b484c0992b5bd00862ce6ed7043f8b23
SHA15cd32f6de78d0a2de5b3a561900ecab5d8ab1cb6
SHA256d71e31a35923dadf57faac598a75c941a8083b3784d7f46e3fa53ab3ddb43bbf
SHA51237ce67aa40e7a36a2a0860cadbe088bb7f37717e829037f3be7a916472624dfdfa65f21d0f95e40cdd7557a6ba9cd1977662a554f4ccb248b86b5b7c74efd3cf
-
Filesize
8B
MD59e3536bbb867b912040d0faff304dc9f
SHA1f67d389d9f85675eeac377bcd3124b793fe1766d
SHA25638eb149b635d7f438a2a761b8c9f31d237d7914e10b32f18dff198d792f1433a
SHA5121020c3fe3f9eddbd0ecfd951e3f0bcfd716c740540fe77e6ed55e3d1137c842441b5a58ffa4830f7c4509309391a4c94bef6e8d7a123dac729e5f4f99e15334f
-
Filesize
1KB
MD5c32885b0c33584cc6da54437a4b4b19d
SHA1e3a595f4d62cd084c9e31850b4df0628469d68c4
SHA25661f8f8e127efdaf037d45bd7ff3e19be9f4198870be97ad974b82ccd622c5a3d
SHA512b2e6ac2a0efa3f80cc281f01e5f8338728b482b0ed057a6c8f759f313477fd7846d37893800686d8f2f153203aa7d6a23b1b0435b2e5d5c5f840e05495036d6c
-
Filesize
13KB
MD56df95b9319c6bd8c7c9c9cd227a30605
SHA1bf1434e07089731c1342fb8748de4a3d9954efd6
SHA2562b227485feaaf1096c0d2f323e8c133db98738db505d65ecd90d9348c61c4695
SHA512c5a25f9df98e589f15c77765eb97b163a194572a0248ee9c9ef08fe691f1269cc66d77ab13f794a672066458be71e77855cec58c1fd05c47e2817c94e4c18d5b
-
Filesize
1KB
MD57846917ca7b91b9bc28a7d5fb0f0522d
SHA165810ea4eb9966fab3f1338e63a617bb64c575b7
SHA2564b867b4d40b5df7e9f7513f2c120c2c5c5cd9d42fadc9b121d3583e4d4c7ed17
SHA512b3d80d1d9385330f9ea70e54c59a7bfa5c6d745696224791386b200ef31636205e37008b61184e49b7e182764d7c7a71f9ad9cd6ce4133260a6679fe7474ca51
-
Filesize
30KB
MD56620cb60412bb4e7fecb51cea8d19357
SHA1c41ba6c7895394349db7d2facb5467cc472b4aa6
SHA256acd5951d5b134b9bea2ca95d5388ad63960f78889d821d2aca7a1ce77c13d3a5
SHA51203e6e863163f791ed2b6221780405446fc1a676147f00db95061564b5e58bd2702047faa219345ffa99e55ba695900102ce7259df421c0ec46190a83c4ab7e6c