Malware Analysis Report

2024-12-01 03:08

Sample ID 241111-njczesyenj
Target 945fd242cb82adb83a27bdfa027dc2280e8374fae638d82e2a1976733ec00786
SHA256 945fd242cb82adb83a27bdfa027dc2280e8374fae638d82e2a1976733ec00786
Tags
collection credential_access evasion execution impact persistence
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

945fd242cb82adb83a27bdfa027dc2280e8374fae638d82e2a1976733ec00786

Threat Level: Shows suspicious behavior

The file 945fd242cb82adb83a27bdfa027dc2280e8374fae638d82e2a1976733ec00786 was found to be: Shows suspicious behavior.

Malicious Activity Summary

collection credential_access evasion execution impact persistence

Makes use of the framework's Accessibility service

Attempts to obfuscate APK file format

Declares services with permission to bind to the system

Acquires the wake lock

Requests changing the default SMS application.

Requests disabling of battery optimizations (often used to enable hiding in the background).

Requests dangerous framework permissions

Makes use of the framework's foreground persistence service

Registers a broadcast receiver at runtime (usually for listening for system events)

Schedules tasks to execute at a specified time

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-11 11:25

Signatures

Attempts to obfuscate APK file format

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to monitor incoming MMS messages. android.permission.RECEIVE_MMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-11 11:25

Reported

2024-11-11 11:27

Platform

android-x86-arm-20240624-en

Max time kernel

149s

Max time network

155s

Command Line

com.app.cconee000k

Signatures

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Requests changing the default SMS application.

collection impact
Description Indicator Process Target
Intent action android.provider.Telephony.ACTION_CHANGE_DEFAULT N/A N/A

Requests disabling of battery optimizations (often used to enable hiding in the background).

evasion
Description Indicator Process Target
Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Processes

com.app.cconee000k

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp

Files

/storage/emulated/0/Config/sys/apps/log/log-2024-11-11.txt

MD5 d6ea019461671ae729691261cbdb2e45
SHA1 980a183c51b94314887117d2d150883a42f83b84
SHA256 1ed4ca672c92b231ac046c50cb0b4f4b688104b9a318a48ae566cd2f0bf6d523
SHA512 d4329310857942f95628dedda7cf4d3f0e2c9f0dcaae56e048b40f803d940a0867d18f5f2f1931ffac45f179dccc3ad5fafdbf1ec9ae5fd0186ea64faf93fd91

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-11 11:25

Reported

2024-11-11 11:27

Platform

android-x64-20240624-en

Max time kernel

149s

Max time network

154s

Command Line

com.app.cconee000k

Signatures

Makes use of the framework's Accessibility service

collection evasion credential_access
Description Indicator Process Target
Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Makes use of the framework's foreground persistence service

evasion persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.setServiceForeground N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Schedules tasks to execute at a specified time

execution persistence
Description Indicator Process Target
Framework service call android.app.job.IJobScheduler.schedule N/A N/A

Processes

com.app.cconee000k

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.212.232:443 ssl.google-analytics.com tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.169.46:443 android.apis.google.com tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
GB 216.58.201.98:443 tcp
GB 172.217.169.46:443 android.apis.google.com tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp
VN 103.74.105.194:7001 tcp

Files

/storage/emulated/0/Config/sys/apps/log/log-2024-11-11.txt

MD5 d6ea019461671ae729691261cbdb2e45
SHA1 980a183c51b94314887117d2d150883a42f83b84
SHA256 1ed4ca672c92b231ac046c50cb0b4f4b688104b9a318a48ae566cd2f0bf6d523
SHA512 d4329310857942f95628dedda7cf4d3f0e2c9f0dcaae56e048b40f803d940a0867d18f5f2f1931ffac45f179dccc3ad5fafdbf1ec9ae5fd0186ea64faf93fd91

Analysis: behavioral3

Detonation Overview

Submitted

2024-11-11 11:25

Reported

2024-11-11 11:28

Platform

android-x64-arm64-20240624-en

Max time network

158s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
BE 64.233.184.188:5228 tcp
GB 216.58.213.10:443 tcp
GB 142.250.200.36:443 tcp
GB 216.58.213.10:443 tcp
GB 142.250.187.206:443 tcp
GB 142.250.187.226:443 tcp
GB 142.250.180.10:443 tcp
GB 216.58.213.10:443 tcp
GB 142.250.200.10:443 tcp
GB 142.250.178.3:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.179.228:443 www.google.com tcp
US 1.1.1.1:53 accounts.google.com udp
US 1.1.1.1:53 accounts.google.com udp
BE 74.125.206.84:443 accounts.google.com tcp
US 1.1.1.1:53 www.youtube.com udp
GB 172.217.16.238:443 www.youtube.com udp
GB 172.217.16.238:443 www.youtube.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 216.58.204.78:443 android.apis.google.com tcp
US 1.1.1.1:53 accounts.google.com udp
US 1.1.1.1:53 accounts.google.com udp
BE 74.125.206.84:443 accounts.google.com tcp
GB 172.217.16.238:443 www.youtube.com udp
GB 172.217.16.238:443 www.youtube.com tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.200.4:443 www.google.com udp
GB 142.250.200.4:443 www.google.com tcp
GB 142.250.200.4:443 www.google.com tcp
US 1.1.1.1:53 mdh-pa.googleapis.com udp
GB 142.250.179.228:443 www.google.com tcp
US 1.1.1.1:53 update.googleapis.com udp
GB 142.250.179.227:443 update.googleapis.com tcp

Files

N/A