Analysis
-
max time kernel
144s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
18-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
-
Size
4.5MB
-
MD5
aa53b28be9e566f884e87a04ede57660
-
SHA1
a2027d1a6b82123921bdab400943f64a6f219cbb
-
SHA256
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58
-
SHA512
360a6ff617e023ec0a15a5f47ab8fa355b48b86197bcc40bb54d85d31e026e2bb94240febeec5d9d910dbb76a339147ee357e9c454bca3fe663c645ca85b12e4
-
SSDEEP
98304:gtYFrfo7Lws5lCR7vQfs9EgxKrCSMsk03i73dSXnS7r50l:Ge2rjCR7aWHorCiTS73dSXGlw
Malware Config
Extracted
hook
http://94.141.120.34
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex 5052 com.bwyzxczbc.fklllrozr /data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex 5052 com.bwyzxczbc.fklllrozr -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bwyzxczbc.fklllrozr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.bwyzxczbc.fklllrozr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bwyzxczbc.fklllrozr -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.bwyzxczbc.fklllrozr -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.bwyzxczbc.fklllrozr -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bwyzxczbc.fklllrozr -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bwyzxczbc.fklllrozr -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.bwyzxczbc.fklllrozr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bwyzxczbc.fklllrozr -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.bwyzxczbc.fklllrozr -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.bwyzxczbc.fklllrozr -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.bwyzxczbc.fklllrozr -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.bwyzxczbc.fklllrozr -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.bwyzxczbc.fklllrozr
Processes
-
com.bwyzxczbc.fklllrozr1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5052
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD51ce544f7a868e0043fd566a325e65e50
SHA187cfc5af95b76bd58f125dfad0a96ae370e01353
SHA25625543679f034652a28b0862c2febac2c902a340ddb73ade4ca0f8faff732860d
SHA512650c3d3720ab63055ea4febfb4794bef3ff3cba4cb07fab109d09e07fa75ac09b0e8a068d75688ec38b02d3b16bfaf3eef907a586bfb21551f1a625db706f8a3
-
Filesize
1.0MB
MD5bcd7cc1d8689b77de9ade55a195ea68c
SHA184e48cf2655ef264a87454d2e943aecdcf662706
SHA25617ed50bf44f76c8a47b2d5568ce6a8d2336158184d2f985f07306da08711b276
SHA512c428a1a8e81ee5b6463758df2c5454c7c3b7a9cc20db581846f97848dfb41a4aad5765f91a46071451d8e39f87528f07ad366ae104d78e24654760b3500cef61
-
Filesize
1.0MB
MD5f6ab39021e83143def92a538661a7470
SHA1cdf141765f6ee6535255834a4510d5d61d8d19e2
SHA25676cdc05af1d17825c2628e27a9d01feb7b1a7639d08aa481223a09500c015310
SHA512e1fd6d60f3e45dd429e13df87533014d6ebc9b7d418ee83fc6dac49cebaa73011a9552e36e90f5d8d595e01d9a2cf6b1d73482214e3b702a947980721ecfe251
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD56ea311d90b04b60469e22d04e8eb4e29
SHA16fde1ebb917e52ec248f2b2ec9d2233c5fac1173
SHA256caa1d7ab8aa52a236d7e540b14bdac02363ae30e1aa5c12977804baace7fce74
SHA512d763174bd1f2ac94dff6b5b23d0dd7e8a547cd05d57e5948b42095b22aa973f05f38fd41fbca9a465b31777c294bb5395d207884a2c4246f2539d7420541afb4
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD520643a9e0a771a188e250c208b75affe
SHA176d04f5c90813db5ce02a7d7a55299cc4b4576fe
SHA256de80530a5416bd8a0da53526e11a55545e5af6872818c0c8d68594d8ba992402
SHA512eb137445d7c2a17b770b81035cab51f97c9e454028a3d60ad87bba5d3fa124aa5fbcd16f6d9deb87378a01d69ecf106a771a25f122d78306106123d7312e34c9
-
Filesize
108KB
MD5b30586b6a5c55c92995c9ff3fed703da
SHA1b412c00f0ee49e56d2a884a66095cbac31a3b95c
SHA256119704545ef50e87b2c7e9edfdf8b3bcb377b9ce7bbf5008f3484fe90da6fb5d
SHA512431439bf70a2ca8fb5716a00f704d8e97f88d30f28c8ac568a0b5b764e1beea0765c985da8e02a2ee8e61399c0183ede1c73bcf6313f3a34e03c0ec7c06ca068
-
Filesize
173KB
MD5d6d24b25714fa76d7bfe48a7a2b85ec9
SHA17e30642c19e606689ef8f49e242006ab09a117c9
SHA256651002ce24ac507f651c198a4c5ca89e264477a8d260387aedba966bd6209355
SHA5122887f5f7928ca7a984386f987884d283c9b83107ec5f4cc587fcf75016fbc6d13ff65acb2ce4eae754d71cc4b17236fcd17bb6ef8efc4d5133c5ce6c4e73748b