Analysis
-
max time kernel
146s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
18-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58.apk
-
Size
4.5MB
-
MD5
aa53b28be9e566f884e87a04ede57660
-
SHA1
a2027d1a6b82123921bdab400943f64a6f219cbb
-
SHA256
efaa783aff130574b84ce63fc957a4ea9e864e0f33ee34b4744d79b1f6357c58
-
SHA512
360a6ff617e023ec0a15a5f47ab8fa355b48b86197bcc40bb54d85d31e026e2bb94240febeec5d9d910dbb76a339147ee357e9c454bca3fe663c645ca85b12e4
-
SSDEEP
98304:gtYFrfo7Lws5lCR7vQfs9EgxKrCSMsk03i73dSXnS7r50l:Ge2rjCR7aWHorCiTS73dSXGlw
Malware Config
Extracted
hook
http://94.141.120.34
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex 4458 com.bwyzxczbc.fklllrozr /data/user/0/com.bwyzxczbc.fklllrozr/app_dex/classes.dex 4458 com.bwyzxczbc.fklllrozr -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.bwyzxczbc.fklllrozr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.bwyzxczbc.fklllrozr Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.bwyzxczbc.fklllrozr -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.bwyzxczbc.fklllrozr -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.bwyzxczbc.fklllrozr -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.bwyzxczbc.fklllrozr -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.bwyzxczbc.fklllrozr -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.bwyzxczbc.fklllrozr -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.bwyzxczbc.fklllrozr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.bwyzxczbc.fklllrozr -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.bwyzxczbc.fklllrozr -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.bwyzxczbc.fklllrozr -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.bwyzxczbc.fklllrozr -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.bwyzxczbc.fklllrozr
Processes
-
com.bwyzxczbc.fklllrozr1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4458
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD51ce544f7a868e0043fd566a325e65e50
SHA187cfc5af95b76bd58f125dfad0a96ae370e01353
SHA25625543679f034652a28b0862c2febac2c902a340ddb73ade4ca0f8faff732860d
SHA512650c3d3720ab63055ea4febfb4794bef3ff3cba4cb07fab109d09e07fa75ac09b0e8a068d75688ec38b02d3b16bfaf3eef907a586bfb21551f1a625db706f8a3
-
Filesize
1.0MB
MD5bcd7cc1d8689b77de9ade55a195ea68c
SHA184e48cf2655ef264a87454d2e943aecdcf662706
SHA25617ed50bf44f76c8a47b2d5568ce6a8d2336158184d2f985f07306da08711b276
SHA512c428a1a8e81ee5b6463758df2c5454c7c3b7a9cc20db581846f97848dfb41a4aad5765f91a46071451d8e39f87528f07ad366ae104d78e24654760b3500cef61
-
Filesize
1.0MB
MD5f6ab39021e83143def92a538661a7470
SHA1cdf141765f6ee6535255834a4510d5d61d8d19e2
SHA25676cdc05af1d17825c2628e27a9d01feb7b1a7639d08aa481223a09500c015310
SHA512e1fd6d60f3e45dd429e13df87533014d6ebc9b7d418ee83fc6dac49cebaa73011a9552e36e90f5d8d595e01d9a2cf6b1d73482214e3b702a947980721ecfe251
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD50116e3edd72863eba88c919aa11185e2
SHA120489cb55261dac97b3aa8ab0c26c174799d6507
SHA256eb9c7af4aa4ad04ef133c2c392b30103dc2d9c7b15903abb4986592ea18c31e8
SHA51205f4751ee9c8653f49f725c22199b03ffa7057b6b479ae14d0cef8a0b821ffb718e9954b5bfe464c82f154fbc4c154e5de412b61b0f1178e25d93f770eb4ae67
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD512690998fcd2cc2509454a20bbccbc52
SHA159b9cb2042d74205bec267693fc810089e69c9e3
SHA2565b7ad1cbba9960e1ff32e4fef7468d3c605aa9381d2c54bb6a4b14c807882ce6
SHA512bad7fc4e97bdc1129b404523825574873b0e57784f61a1701ab3af4137d2c66288077d6d9f2abca4031813f3f35219e331801b1d593651ff561d1ddb3b2c259a
-
Filesize
108KB
MD524baeb1be1b4d99395728d674e332515
SHA1e4ce16b37f2b51856c0a89fd8d0526b7eec2f15b
SHA256d9d0b0b2730e870089b36f17c2a6c6505bcb378d7149798fa6b2e665999dd6fd
SHA51250e313d3fa34ef07a99258692ed40e6a5d5275531a34f467a6a31630e9eefe81a7e50478caab2c41f1340af246853e20d3d4b8c83570b12a8ba2a7d4da00d1dc
-
Filesize
173KB
MD5622f59022e6903ceb5b7a73fb81cfd2d
SHA1f2a01cf2d07f25a2e4e3d59dcc659c9b0a8e0924
SHA25625488d12bfaac1ad07a57b83cbe846a22dc6e16efcb399636634315a748880d8
SHA5122773d7973eaf10aaf1a9b205ab7cf95323f06d0d4d1bcfe8db24db6ed297cc619694fcb5d6880ef06edc6c181d2ba0eda166dc735c165e20f864bacfbe1d05ac