Analysis
-
max time kernel
137s -
max time network
161s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
11-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
6ad2691cec280e4eafff211113adbc063089e30855daa4382e69bf031bc14a83.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
6ad2691cec280e4eafff211113adbc063089e30855daa4382e69bf031bc14a83.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
6ad2691cec280e4eafff211113adbc063089e30855daa4382e69bf031bc14a83.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
6ad2691cec280e4eafff211113adbc063089e30855daa4382e69bf031bc14a83.apk
-
Size
4.2MB
-
MD5
0fe3b8a38217d77be4935ffb62cc30f9
-
SHA1
c193c42204c1f8bd2feac4eacbaf08bf4a6a5a3d
-
SHA256
6ad2691cec280e4eafff211113adbc063089e30855daa4382e69bf031bc14a83
-
SHA512
67c21e3db4f93f756c48cedb127f19c4f3f701f0abce20a6a81d338a1d6b2863845ce341623ba42ee3443868cabaf5d45f8cf1325cf19567670672205666859d
-
SSDEEP
98304:1856qVvPKFINLj+B1l8V3cHzun1/ZkZQo44Eb:u3NR01l85cS1/yGlz
Malware Config
Extracted
hook
http://94.141.120.34
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fcghuasqt.cotcrxzol/app_dex/classes.dex 5125 com.fcghuasqt.cotcrxzol /data/user/0/com.fcghuasqt.cotcrxzol/app_dex/classes.dex 5125 com.fcghuasqt.cotcrxzol -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.fcghuasqt.cotcrxzol Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.fcghuasqt.cotcrxzol Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.fcghuasqt.cotcrxzol -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.fcghuasqt.cotcrxzol -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.fcghuasqt.cotcrxzol -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.fcghuasqt.cotcrxzol -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.fcghuasqt.cotcrxzol -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcghuasqt.cotcrxzol android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcghuasqt.cotcrxzol android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcghuasqt.cotcrxzol android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcghuasqt.cotcrxzol android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.fcghuasqt.cotcrxzol -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.fcghuasqt.cotcrxzol -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.fcghuasqt.cotcrxzol -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.fcghuasqt.cotcrxzol -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.fcghuasqt.cotcrxzol -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.fcghuasqt.cotcrxzol -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.fcghuasqt.cotcrxzol -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.fcghuasqt.cotcrxzol
Processes
-
com.fcghuasqt.cotcrxzol1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5125
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5d5e525a5383d83e0192418408d726e68
SHA188a20733bf3e31a3cc8115ecf9468a6f7d8c3066
SHA256eb5e87c5bc8954d4ead3b88f1858b4d68d3e0966e632b1c36c9c897f01313161
SHA512db158c02d0e411a80d58ef183d462ff3321b36e7e7ed7da633a281ef3adf671184c74cbd2d15aa6ee3b1592c9d01f2f865be4ecf9f3b0e0a1b3f717084f133b2
-
Filesize
1.0MB
MD5c56aac70f3062c5f1faf1292964061f0
SHA1d05a25611b3e8b314f719a588720a50825952c6e
SHA2564e9860b0baf238b0b8f225eb3b04f1c8b2052f68f7d23b76b9a0028f6d308789
SHA512f93e4838e586178ac7c579f76d0f26c14f829c6f37cb38d3a63c2e45415dd0d8216497113d37e5ad9ba1026d9d60361f5e7d163588612b9eff8dc990514c29de
-
Filesize
1.0MB
MD5591e04e6123cd403268deea290ea721d
SHA13c5497418cbd71546cd8088fc68521f43271858a
SHA256cde626a00e2d305de23d293329279b32a3efac0432197636cdd1eb37a4ee8698
SHA51253aec2f1258edc52c2c139d238505477e902393200001a4e7e3b4d798a75e4b929fd38c002bfac0a85c3524873eae20f86120bc0d49c039cd1c9fc5a9b1653ac
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD578456e89242950fa93ce9c8be1bcbf95
SHA150ac523d0a3a6048d49cc144aabe14c73f1aeafd
SHA256edef569477b8da8a5905fd9c12b8573110342de252ffb2bca80854f769e02fea
SHA51248ed410220c70b7f9d54836518360813b3825dc62c4114e7c28f5130bd61666f1df205b8779f22a21a0574bd37dc80daef33f5951228390c05a33377ac7ff8d5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD507370be521b064400959933136d1a06d
SHA17874a7bfb0359c3ba181e70a49fcae644bfaa1b8
SHA256bb5598e7db3e40d78f72f2f14409c73fd20fd5db9bc7e73d331779e1f29db73d
SHA5120c3dea4db71b17f7fb44b8b04f83fa9978b44fc0235ea598f69279553a10ae6941256dca64f999dba1ebf3e3c7ee433aea5ae14307b02af788c04b6385fe7f99
-
Filesize
108KB
MD5da1a8c9d45d6cc5b54f6e2ac51a0a3b1
SHA19ead1be6ca210eb3e4fc4d72824ba0cf94aa9784
SHA2569be7f20f9f3a230e1d94042736dd004dbdb3cd63149b6fb67f7f79f50a43cda1
SHA51238a55fac764a727821636de397498f363aaabec7c018f6033354576cdc6825fba5562526f5a2deaa58a21a81af4f901c16d9f039ac60faba0abde1dc8966c281
-
Filesize
173KB
MD557c459886771af84e3ba763a95f94f29
SHA1873ecc78b55809cd4a91519c490d0073fe2e7249
SHA2560f745121e26c13c0a3de250418bb3542befd3dc93a3d4ab9591575a94794f2f0
SHA512e47de488257035e6e43e5cbe2f6e383dee77a1fed3b86929b6cd23fa240a964e82a4b19d602ab04e0c73f9957ae19ab72e660b9de45a5109563a4d23acc17759