Analysis
-
max time kernel
149s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
18-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
-
Size
4.5MB
-
MD5
aa53b28be9e566f884e87a04ede57660
-
SHA1
a2027d1a6b82123921bdab400943f64a6f219cbb
-
SHA256
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58
-
SHA512
360a6ff617e023ec0a15a5f47ab8fa355b48b86197bcc40bb54d85d31e026e2bb94240febeec5d9d910dbb76a339147ee357e9c454bca3fe663c645ca85b12e4
-
SSDEEP
98304:gtYFrfo7Lws5lCR7vQfs9EgxKrCSMsk03i73dSXnS7r50l:Ge2rjCR7aWHorCiTS73dSXGlw
Malware Config
Extracted
hook
http://94.141.120.34
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.bwyzxczbc.fklllrozr/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.bwyzxczbc.fklllrozr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex 4260 com.bwyzxczbc.fklllrozr /data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex 4285 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.bwyzxczbc.fklllrozr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex 4260 com.bwyzxczbc.fklllrozr -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.bwyzxczbc.fklllrozr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bwyzxczbc.fklllrozr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bwyzxczbc.fklllrozr -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.bwyzxczbc.fklllrozr -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.bwyzxczbc.fklllrozr -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call android.app.IActivityManager.setServiceForeground com.bwyzxczbc.fklllrozr -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
Processes:
com.bwyzxczbc.fklllrozrioc process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.bwyzxczbc.fklllrozr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bwyzxczbc.fklllrozr -
Reads information about phone network operator. 1 TTPs
-
Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Intent action android.settings.ACTION_NOTIFICATION_LISTENER_SETTINGS com.bwyzxczbc.fklllrozr -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.bwyzxczbc.fklllrozr -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework service call android.app.job.IJobScheduler.schedule com.bwyzxczbc.fklllrozr -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.bwyzxczbc.fklllrozr -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process File opened for read /proc/cpuinfo com.bwyzxczbc.fklllrozr -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.bwyzxczbc.fklllrozrdescription ioc process File opened for read /proc/meminfo com.bwyzxczbc.fklllrozr
Processes
-
com.bwyzxczbc.fklllrozr1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Requests accessing notifications (often used to intercept notifications before users become aware).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4260 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.bwyzxczbc.fklllrozr/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4285
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD51ce544f7a868e0043fd566a325e65e50
SHA187cfc5af95b76bd58f125dfad0a96ae370e01353
SHA25625543679f034652a28b0862c2febac2c902a340ddb73ade4ca0f8faff732860d
SHA512650c3d3720ab63055ea4febfb4794bef3ff3cba4cb07fab109d09e07fa75ac09b0e8a068d75688ec38b02d3b16bfaf3eef907a586bfb21551f1a625db706f8a3
-
Filesize
1.0MB
MD5bcd7cc1d8689b77de9ade55a195ea68c
SHA184e48cf2655ef264a87454d2e943aecdcf662706
SHA25617ed50bf44f76c8a47b2d5568ce6a8d2336158184d2f985f07306da08711b276
SHA512c428a1a8e81ee5b6463758df2c5454c7c3b7a9cc20db581846f97848dfb41a4aad5765f91a46071451d8e39f87528f07ad366ae104d78e24654760b3500cef61
-
Filesize
1.0MB
MD5f6ab39021e83143def92a538661a7470
SHA1cdf141765f6ee6535255834a4510d5d61d8d19e2
SHA25676cdc05af1d17825c2628e27a9d01feb7b1a7639d08aa481223a09500c015310
SHA512e1fd6d60f3e45dd429e13df87533014d6ebc9b7d418ee83fc6dac49cebaa73011a9552e36e90f5d8d595e01d9a2cf6b1d73482214e3b702a947980721ecfe251
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5ca857159eb9e762907094b075ba19d91
SHA14c18b0c5b5c0bfeaa8c99e8458693f537379746e
SHA2568a3259565aff4d0d8d9ef5a3ed2715d8b8bedd56f07033c5d5f9381f2111a94a
SHA512b5e55d480f6bf843b7c534956dd4a90e2e28a6ac1d4372a5429184eab4c1965c8962f159fc58197699e99944bea62146561722ee0f03fef4f3ae490e2059ef3e
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD593f312e28357bd6ce7f6117658fd6f56
SHA1eac0f627c064ea0def082fa2c5e4e5aa4d4aa4f2
SHA256e32b7996f7ec65185d4800b1fcfcdb34b089361879f8c8666a5f62109526812b
SHA5121d92a582dbcf3fb42c5e9a0491eead540a14048ed5bd1568f5fc53cba055789cd27b395172f83a8ac7d4d89470ebd9efec7286ba4f2626b64dcb61cfb68e3d58
-
Filesize
173KB
MD5839e31225eff7abfec972be3449e5f3f
SHA123a8355abc8b5f789667a65d040a76a3785dbe18
SHA25663c9674aee3f1d2b4627b530563aab879ce3ea64e8a5b18dcf061b54440888d4
SHA51296c6d625df063de9abc9646ab5405aef34b1c6a924741eac642b2df4fc20a6ceff12bf9ccdca9a78f4af55d3945902dc5ad70335931c800c437a0787ba4ba93c
-
Filesize
16KB
MD52be5fa75c532086870fcc8edbca51eab
SHA12195177571077a411d7b0017b758f59983919eb2
SHA256553d326a0647344dec67f235d9a8393240e21da23ba8cd0874f87086a08f0007
SHA5122fa86e5725e3b3fe77c4bd5a47e0113667d7cace1ffaa4529d0dccd8d2f5ffd37ff677e1eccf93c1b8d1be4a3e335b1bd011d7d6704ad1c02d05433b876fbeba
-
Filesize
2.9MB
MD54f7f508a747991e2f1cab40868f63904
SHA1fcd1ca0648b2bf8d5701c815442ebadadb1a76e8
SHA2562c1b6a8fee0cb662c1303fb1befd45a89d351f603d1641920432fa12c5731f72
SHA5122748c816a2a5ca8420e4bc77ae14575fe5e0238d91785919c4fe90013676338f32d73bbd6642f361a7fbf233edf2a6a2d3c69abdb6007ac9a3eba3fcd3f9402f