Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
16/11/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000.apk
-
Size
4.8MB
-
MD5
d3da3e52be0eb1ce46533f7e36f50e1c
-
SHA1
fc58ac245d61664428727ab4afbad68b7b86b0e7
-
SHA256
db877682fd0d489d9cb9aa1083ca05aacd61d9e63675dee50c10b010e3946000
-
SHA512
0ad81172b5b3aacfb13855fa3f300f939e7480a1857337e76dcc2d68ddf8eee563d6c817f7cea42a8cf4c107fc7d6a4699969789100764549fbba54b0dccffb5
-
SSDEEP
98304:O6PRNrPJ44RsVRdxaKgBemDx2+Po2DEN7Y06c9VreJ5L+UfVoMz0KpLpj:DRN7JDCRHabJQeo2mY29Ne/CUic
Malware Config
Extracted
nexus
http://109.206.243.54
http://109.206.243.55
Signatures
-
Nexus
Nexus is an Android banking trojan related to the SOVA banking trojan.
-
Nexus family
-
pid Process 4331 com.car.debate 4331 com.car.debate -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.car.debate/app_DynamicOptDex/LAGt.json 4358 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.car.debate/app_DynamicOptDex/LAGt.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.car.debate/app_DynamicOptDex/oat/x86/LAGt.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.car.debate/app_DynamicOptDex/LAGt.json 4331 com.car.debate -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.car.debate Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.car.debate -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccounts com.car.debate -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/contacts com.car.debate -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.car.debate -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.car.debate -
Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.car.debate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.car.debate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.car.debate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.car.debate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.car.debate android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.car.debate -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.car.debate -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.car.debate -
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.car.debate -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.car.debate -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.car.debate -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.car.debate -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.car.debate -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.car.debate
Processes
-
com.car.debate1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries account information for other applications stored on the device
- Reads the contacts stored on the device.
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4331 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.car.debate/app_DynamicOptDex/LAGt.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.car.debate/app_DynamicOptDex/oat/x86/LAGt.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4358
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD574ee6286df3aa4521e5fdd6ee2477b79
SHA1bce0760b786c0c6f0bcb2b580ead622ade38aedf
SHA2562577bf7ba7953d11b816c0174efb60f68d32fbc0fc484f1e83ec38e9667d78c8
SHA5126a355b2e3e35af509ef190de5b103b39bb594b3987f86b25601075a23a45ccf019f1ddfcce2aeee57136ff55c025b1dc210d5c9d9ae6354638e4d306d4f18366
-
Filesize
2.2MB
MD5da56247f322aa732e5c1b79e016339ae
SHA10b31c293536e12dd284218b82e3c596dfb6f4ddb
SHA256bfe9cab5cfb0353027005ad0cefbc43f757faab39435bcf3f76d8f1b19b076f0
SHA5127f4b95163fdada7574948dd8e528d377bba538907fbae90db5c9df9a0a50bbbb2fb831c7b11b0c4c2361c52508bbf9ca19d075c74777120acc4a6baec3b6f7c8
-
Filesize
6KB
MD5a449f82993c2a3dcbc44a198dcdd895b
SHA1edc587b472f35ab4b571d71f4bc3a943c1ce5a9b
SHA2560f7753f6e8fb32eeeef5a631e393176a06c8e2d189f70f3aa6a3b48376940c61
SHA5121961e8ff32ea38905a1886f8af86cd8368d0728aa223230d2e4421ae1c2c80038984bff8d71e122d5e978882352031295d98414668e614b2f16e2eacc122b4f7
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5cd6f49d688845ba454f85ed381d14819
SHA17c78e3283131a340ff216e4a29cca29eda18c374
SHA25653484db7cce85d2fb758415d17b25b5fe546a7b4c7c7ddc0a3bedc743786b94d
SHA512f140ebab9df36803813563beb6c45527f32d85e118230ae909bd14eccd3b86e778892fdd1e3c391aa5307a9e9a12f825aa3b5890e156c7f5e55068e9aff2909b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD5974553310bce0ef1b7c71480187c78ab
SHA1e5355403fc2bc7c999950193121d94c366321eb9
SHA2567a8049ae3376dacf2ff44ad20722c5d6a67a260b9f7b6c6d5828d030f9068ef9
SHA51207b9d096dd978e367c1329d1d59b2a044d5b64f62c5f6d66c87deefb596dad11b93c9ba5bf3986200b5b9b1208268c971f89baf837abe51110f9aa7b5dfe9517
-
Filesize
221KB
MD521724a2dbd5f7c562710f5ec416e93e2
SHA1e529b2f282fd3f7069a5a732273b0386dd58071f
SHA2564740c48c4d6eb7d68ea31bcab4e9a7139ef3b999377e091593f0c66785eea120
SHA51210b46c3b11dd203288fa1724bd31f7dfb2f95184d83813ee45d99d8be25390a692b81682db651150e0b21e4795df37bffcc04632dcf795ca35de1d1abf4b3f00
-
Filesize
16KB
MD5f62c7392082dd090e7e7b74a3526e5d4
SHA12baf60c288741cc746e8cacc6c9f27ad8b4dd2ed
SHA25624a6a8245dc87708e633c9d14ca10a2bbebed4ba35be0b91c7642e3beff4dd66
SHA5123eadb1743ffcfdf1fd331f53f9d37598bf1e43b35e2d09f1ad07b1c733922562351278fb5e87143ae52707a825c93ec5cf3a304e3032bf6fcd9f346ab9a2fab1
-
Filesize
6.1MB
MD576f89ae779d54f4a3f40adfa812958ee
SHA1b02ee57fa4c9e81d45be9aea84b08ec167d8fa31
SHA256e65d6945c6f4dec090e4bea1417bed015e03aeb4bbe7e3a8a32f730a58f36e2e
SHA512e4a77901e5f69d80e218aa80f6a113786b8d91899ddf576af9b7448966e47e1a2ab6b3c1c0441a77a3e8dfe556d45019d410acc3deabff4b12ce79c0a8aff704
-
Filesize
6.1MB
MD5cc20cd55132e50678f89fd6c8b862801
SHA12e2bca371167f78001b13f73e2bbded35fac84af
SHA256e0f9a272f590ad53309e8d8aefb54cfed7c6d2113ff2255528bb739b09fc5579
SHA5123660bdc5a0a6e99c0de6595c1c365143f6f26a9e44e46195dce3fd570cbd65f5c558be69a7f0a60843908a607792b0c2bfb4009c818d8c50b1a65e44ba321b8e