Analysis
-
max time kernel
147s -
max time network
157s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
09-11-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
bea33729bc4f84036bff7c7aa4a6b1a416274206acd0ca94181fe51625a785e1.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
bea33729bc4f84036bff7c7aa4a6b1a416274206acd0ca94181fe51625a785e1.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
bea33729bc4f84036bff7c7aa4a6b1a416274206acd0ca94181fe51625a785e1.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
bea33729bc4f84036bff7c7aa4a6b1a416274206acd0ca94181fe51625a785e1.apk
-
Size
4.2MB
-
MD5
bde1f8198e60a444ca6e4a02b58906c4
-
SHA1
e19156ebe88dccaf5c04bf2835d51fc9a38be96c
-
SHA256
bea33729bc4f84036bff7c7aa4a6b1a416274206acd0ca94181fe51625a785e1
-
SHA512
ebe3a5dcac3f420f867ee4fd8a8bed5c712f999bd0a406d7f5285862c212fbdbce170944f6848b3901c558b9931bb02aad18e2d8d3f773651dc109f63e94035f
-
SSDEEP
98304:yYa86R8FswqsrhzSVSvKcAttJNIOtC2Sw4XVAlS:le2FxhzSVMAIozS9VZ
Malware Config
Extracted
hook
http://94.141.120.170
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ieznsjstg.fslmxptit/app_dex/classes.dex 4249 com.ieznsjstg.fslmxptit /data/user/0/com.ieznsjstg.fslmxptit/app_dex/classes.dex 4274 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ieznsjstg.fslmxptit/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ieznsjstg.fslmxptit/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ieznsjstg.fslmxptit/app_dex/classes.dex 4249 com.ieznsjstg.fslmxptit -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.ieznsjstg.fslmxptit Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.ieznsjstg.fslmxptit Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.ieznsjstg.fslmxptit -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.ieznsjstg.fslmxptit -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ieznsjstg.fslmxptit -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.ieznsjstg.fslmxptit -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ieznsjstg.fslmxptit android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ieznsjstg.fslmxptit android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ieznsjstg.fslmxptit android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ieznsjstg.fslmxptit android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.ieznsjstg.fslmxptit -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ieznsjstg.fslmxptit -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ieznsjstg.fslmxptit -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ieznsjstg.fslmxptit -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.ieznsjstg.fslmxptit -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ieznsjstg.fslmxptit -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.ieznsjstg.fslmxptit -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.ieznsjstg.fslmxptit
Processes
-
com.ieznsjstg.fslmxptit1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4249 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ieznsjstg.fslmxptit/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ieznsjstg.fslmxptit/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4274
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5df356750403f54b6a7a7cc14035f871d
SHA15d288fbf40c96502d80e502e761c0bc37760660e
SHA2560b07326d6eec7003653183be7240a5fbcf1e72095599627f57651f791cf9661f
SHA512b2b94e7808279f80aeab15c23a719a8b727c9f0f1214f7c688884fb275bdeff3cc32943404d1786a62864f301ad2398d4436857dd6bb5ccb0b3663626f2031ef
-
Filesize
1.0MB
MD5ac9339824353ad4863ce5b2bf434bd3f
SHA175ddf180ff36d4077e203a5509193a53d13fb214
SHA25630f4026bb255fff1a4214cab39600ea4a81f6b62102e00e689a703fe60f0cc50
SHA512ccc62f8f98dafc58a11400340c3a0d25aa66ee3d3dca0b7cbbba06a0fc06b85c78020c4fb1bff7478375ac2e125ddfd7fb9b7e80b63b7931373c4d0da142bc2b
-
Filesize
1.0MB
MD59282ab3c01c32477093474bece039bb0
SHA1bee74830165c8059ab766ea0620b711612b39790
SHA2563bbfb1b851abac60de75a3bf2b9ffd15b167b0bdaafbf07afdf26be5fdbaa5fb
SHA512e62fbb0e26a58fec5cdca802b101312cb5904ec2fb8cf45a801a080ed7f7fe361290680e170b6ca3691b1e9294980fc961c480d5d8db3ea00caeb7a39924f15f
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD50d25ff8ae222beaaf61a8653aec1b261
SHA18b67653b08edf7007161749765661b6ba6d673be
SHA2567df95c3d224d0e8459a1bf1fe0d78f108f5b30dbc0c4fd04f0d35ce0b31b58bc
SHA512621590f785bf4075553928b647e20aa07e616f672830e2d79a4c04b4b4332a4803e0d2f8a7ec31de810cf47778f9eec50134fa99252a6bebad4b3993f0297131
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD506a4785d09376a7d520347033ea1dfe3
SHA14cae1c32ecc5927b6021ac46d244db1be03ed629
SHA256532fe2eeb17f0db311774b87b5574aec4c943459d0e630594e866894577ebce4
SHA512737c54754ffb77b3b152c1fcbb2da8354109277dd7a58a3313ca88f6a655402fa69f110b74217f9ff4bd6ac0c6665b7ff5100b309e343dd6772424646159edcd
-
Filesize
173KB
MD5f7da1e698a71fad871f573d8e6c401c2
SHA19dc97e8b844fb570188da515069a678e4573afa4
SHA256f8a4d47459edffa02ac3dd31cb5d7a810b376c2afaa0c9e62715a60ea0a5ac26
SHA512f36e4ba6479db16dfab8482507e4bfb3494bc1a7d8234e4b6faba9379985f1186bf046bda18eef65f800defc729a85c7e099b7a9f2ae479f3708d2b31b1d2044
-
Filesize
16KB
MD5c3cdfc288e35f409053b12eb2b117251
SHA11776b170863ce64874d0d27faa330cd608db9a54
SHA2560cf20502db7878a95f450da45ffdaed2892fc17d145de80a798f660d3826bdf7
SHA5126878fbae87159f87f9d41b36800b4e4da477d1a10d73e769605cd27a37cf7e72982dcb0e3c85e9106f7944d02ef59b9c1e046efee4bd2bcab23870c39bd39243
-
Filesize
2.9MB
MD5eebb1215dfea9dcd613cda3dbb0c92f9
SHA139acda0313b48456cf65338ebfd648fe8049a218
SHA256bbbb3f74758fe61cdf0ed8fd2c4ca702b9022d9417ec32b607cf30f3393ee163
SHA5126626aa82d590e14d76b5badd4806cd001c06891fa8ca1b2292edaaf18d926fa129448bd15ee77bbd104dc21c04bf00c24dffc0c57e22e5d80ec288de392645f3