Analysis
-
max time kernel
149s -
max time network
162s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
22-11-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
609eb001b2ef877d2d75446b0382321ec8aa4c2cea9d7cbddde479962687ad76.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
609eb001b2ef877d2d75446b0382321ec8aa4c2cea9d7cbddde479962687ad76.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
609eb001b2ef877d2d75446b0382321ec8aa4c2cea9d7cbddde479962687ad76.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
609eb001b2ef877d2d75446b0382321ec8aa4c2cea9d7cbddde479962687ad76.apk
-
Size
4.6MB
-
MD5
2857b4fb409629ae5f161c96470d58ba
-
SHA1
282a482d799d792cb2df8002f27a4e6c5029a85f
-
SHA256
609eb001b2ef877d2d75446b0382321ec8aa4c2cea9d7cbddde479962687ad76
-
SHA512
a2756c95f20bfea7d067fae37a20b68732b8d39f29e7051c96bf45168073b8009ddd58720dcc46d4e3c98b57a9c2524e3bd9ac6f7988f98b32fa237557f12295
-
SSDEEP
98304:nTymrArg5a4/+P++6i4ZAWBUMkhwdi+BJFuAESn7YzhbP8Tna7E:T7rlBC+W4ZhBVkqdiQJcAhn7YVQuo
Malware Config
Extracted
hook
http://185.147.124.250
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.gbqxnvcjv.ucoujosyu/app_dex/classes.dex 4278 com.gbqxnvcjv.ucoujosyu /data/user/0/com.gbqxnvcjv.ucoujosyu/app_dex/classes.dex 4308 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.gbqxnvcjv.ucoujosyu/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.gbqxnvcjv.ucoujosyu/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.gbqxnvcjv.ucoujosyu/app_dex/classes.dex 4278 com.gbqxnvcjv.ucoujosyu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.gbqxnvcjv.ucoujosyu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.gbqxnvcjv.ucoujosyu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.gbqxnvcjv.ucoujosyu -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.gbqxnvcjv.ucoujosyu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.gbqxnvcjv.ucoujosyu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.gbqxnvcjv.ucoujosyu -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gbqxnvcjv.ucoujosyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gbqxnvcjv.ucoujosyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gbqxnvcjv.ucoujosyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gbqxnvcjv.ucoujosyu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.gbqxnvcjv.ucoujosyu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.gbqxnvcjv.ucoujosyu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.gbqxnvcjv.ucoujosyu -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.gbqxnvcjv.ucoujosyu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.gbqxnvcjv.ucoujosyu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.gbqxnvcjv.ucoujosyu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.gbqxnvcjv.ucoujosyu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.gbqxnvcjv.ucoujosyu
Processes
-
com.gbqxnvcjv.ucoujosyu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4278 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.gbqxnvcjv.ucoujosyu/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.gbqxnvcjv.ucoujosyu/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4308
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5cd656538ea17b154ce6e5e924ce51226
SHA1c0c3e008fcfb283a1485275f3f0793a3550fcab5
SHA2561f8d6ff3ea76583a2116a0dd16dea77e7aa79bd74b6bc19f65005b5c6fb470e1
SHA512fec605c89a58dcad69be6f22f3efae9bc5c798cacb57522d26cf230ba8c1d48cb20c50d1d4226128347c842975fe689f6a662dfdf355d4b029012bf72b74cac2
-
Filesize
1.0MB
MD52eef054e2aa0d5b5b860a5aff35449b2
SHA1d80251639ab6486d83bebfa77d1590a01c265e5c
SHA25616b476cffa816758ab2cc1d5c61a13543e483bfc5cfd97589eccf9a4313f13ac
SHA51280638f11bf1ec9a31d0baa0049fb7c2ca2a38576fc6d5abe7193887f85160fd0a644c9133f9f66d7aa8d7420267cd83e845d490da0a2f753d4e226c57691c32e
-
Filesize
1.0MB
MD5556c86801ccf48bc917e38546b067308
SHA1a996c082a2b4a1785a41167ca5d418c06dd01a87
SHA256c287f01e17975b0aec265756b2ce369dbda205182b165c9ce5ffd1cceb626a26
SHA51271fa6711d665da5aa70126fa3fe78e3619fd5189b93ee9398cd452d621e60f4cdf00b358c5aa3daa8dc7d8f3ed33a9f3538730808015ffc3ba1eb941dcb1e9b5
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5489eabfb14303bc019b7c5b67ed31d99
SHA17f359f591cd03db1534f920b23f9c6b77157dc89
SHA2563f808f39d70abfa6fd4d91788b97de5a03d417292f6074bb5000a9edae44dbad
SHA512d4b6bc62d389081873b55704752f34265ed0cca77d4aa6ab4b10887810f8eb38f743f5d3aff17973f7f9672d24ea12999f1a747beec3860d95b42067c5cc4ae3
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
108KB
MD51cde2d8ed2fc3aa5fa48463792527c49
SHA1731d5f1a3be1861424c9ff266bac3c38d4ba641f
SHA256b889c36709c91e9ed7fec06eb6834547b03956dfa4d306e9566fd78629ec3255
SHA512d7a8af311f03b1b8847fa0d8084e3c3cf0cfe7280f34ef03737d6343f97dc436320b9b85cfd5754c8f628f744957b4e2c41bb5d695b71b38e3a35e0c91b0c8bd
-
Filesize
173KB
MD5e330c63f1e5025bf1ba11af2a6395984
SHA1986d1d11d7a9a7080e925f36501b9e9ca71799b6
SHA256848951b3bb9c69bf1728a567625efd8bc16d3ae10a2788f95417e055fabe9440
SHA512e9113bb0b3c1adb7e58cdfe1fbd74092204ef01a3e41dcd2ae48bc60aa87551d57492ca95df4daff255382e045faa54e811323f495c7fb1cb067262a99297032
-
Filesize
16KB
MD501f108b4470e651cb071a01699628223
SHA1dc0c0e21e86179eff6c566f178b30e89659e1eef
SHA256511f28fc5499c28d52517e7903992e8f3bd0ce3fba8f631b7681921aa3229b05
SHA51255b4b41047df84732b0da6af8f6b4f2182c4aefbd5760484aee1c08a1002f0f25d3f240db8165d7e8a4442d448d2d462fefd9625ff47dfb7e0117f9ab65e7149
-
Filesize
2.9MB
MD53db786a969f2793b7546d16420ff8b26
SHA13a161cba69092b3490be2e2a4ed01af015eb03e8
SHA25617c4aebffc71641533891e2e926e1a5bd2a3aed52b0d49137f26e6eac12349e7
SHA512b6f2d7b292cffcb70f0024e377acfe5b2697f84e123ff4b7a983840b02c8282fd040a6e3ad93d5dca6f1fd212946b6efa1921640558883ecb059b4e4475b1d48