Analysis
-
max time kernel
147s -
max time network
160s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
24-11-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
67373336444cf92861d23ae41b534d2f7ad3722a3fc4a23ef97a5e31d34782d5.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
67373336444cf92861d23ae41b534d2f7ad3722a3fc4a23ef97a5e31d34782d5.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
67373336444cf92861d23ae41b534d2f7ad3722a3fc4a23ef97a5e31d34782d5.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
67373336444cf92861d23ae41b534d2f7ad3722a3fc4a23ef97a5e31d34782d5.apk
-
Size
4.6MB
-
MD5
df766b5790e29da663fdfd318395f2aa
-
SHA1
352727a10de625e12b53259ef363cc8de5181f02
-
SHA256
67373336444cf92861d23ae41b534d2f7ad3722a3fc4a23ef97a5e31d34782d5
-
SHA512
e0964d5e8abd06f311358add145bd2e95893d01ac684aed6fc86814135b48044012d86b4fd806fc4ba7f511201a79a789762ea7d106be829cc8532163fca47f7
-
SSDEEP
98304:CVziM+K+UCY/U4C1NGGEbZKJlD+16zr6ZSEn+mIC3qN6P2GYLlR2MNJl3:OD+Gz4UKkWfmIdNlZQMx3
Malware Config
Extracted
hook
http://185.147.124.250
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.rxpdnpgga.abhpsrmqg/app_dex/classes.dex 5056 com.rxpdnpgga.abhpsrmqg /data/user/0/com.rxpdnpgga.abhpsrmqg/app_dex/classes.dex 5056 com.rxpdnpgga.abhpsrmqg -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.rxpdnpgga.abhpsrmqg Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.rxpdnpgga.abhpsrmqg Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.rxpdnpgga.abhpsrmqg -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.rxpdnpgga.abhpsrmqg -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.rxpdnpgga.abhpsrmqg -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.rxpdnpgga.abhpsrmqg -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.rxpdnpgga.abhpsrmqg -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rxpdnpgga.abhpsrmqg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rxpdnpgga.abhpsrmqg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rxpdnpgga.abhpsrmqg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rxpdnpgga.abhpsrmqg android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.rxpdnpgga.abhpsrmqg -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.rxpdnpgga.abhpsrmqg -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.rxpdnpgga.abhpsrmqg -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.rxpdnpgga.abhpsrmqg -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.rxpdnpgga.abhpsrmqg -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.rxpdnpgga.abhpsrmqg -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.rxpdnpgga.abhpsrmqg -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.rxpdnpgga.abhpsrmqg
Processes
-
com.rxpdnpgga.abhpsrmqg1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5056
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5357f0b57c3a6362184605e5bd940e33f
SHA137d587e78e22756abfcc706019ab1edf3288d47a
SHA2565b7f0bb3f4ec19c8fcfe86f4d81bc21b2e52592d6a4035c7f6e27c96abf51325
SHA51206f46e7940445a34cdef68bc7a105e265a55562022106dcd9debbbafa78e00b57827975f70da7fa4d4522dfc9a5b71e7644304cc519417a7f68dc894090f0ecf
-
Filesize
1.0MB
MD5bdc3c530f389ffe9124c53c8c2c9186b
SHA19119f877986d2f6c9a589bb782c50885ef56f3bc
SHA256e134703948aa0d722e807d1a5802fc635b821de5794319ce5ef0ea3b28e3d622
SHA512963acec4ececd695ecb607b75d9e12af502aa4cd213d873461b4b1140336bbc2df957a5787e802ae2a15779f90409953a8f268893fb156f027c53d1e6b043b7c
-
Filesize
1.0MB
MD504b117e0718666eff9c4f90ca9aa70f5
SHA190a74e83e45aef3910f185676ade0e83fdd6c3a6
SHA2565be978cfefa01aed5a3d0e294866a10990e6399a4f1ff7edb4d0d0efc1a94211
SHA512aa7470dab915b0254dbda03332f9ba5ebd0f6682c27d4736edae5a63588cee4f11206ddffa66673d352098546a5f8677e7cefa2dd7629742bfe3a79c94de9b40
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5b3b94529bf4131e5e7f9790bbc23169f
SHA112041aa2ecb12cc7c2df85d2d28bb2aab39ec63c
SHA25686142072dc083d1b88cd8e86f0110c0aa49e0e0d002c29b35a6b7969406b8f1a
SHA512143e32bc09d5e6e130ce85a5801d3581a715b0e77292cc4e544eec9bfad400314e2ecb91fe4312bd8e45e2ae508962eb581986bd0cadccfbc0feb26f785228b5
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD598088be7c0980de153efb7742ccc8e1d
SHA1019882028e99d21494061af4d04d2645407f01b7
SHA256b814e816c67b7a3c8c263f6c30989cc2cb07436be85c2c853a2c72eb51b9f0a8
SHA512e1d78bdad735303f5afe6416f3ab805f8a9b75fb64f1c2be022881f8b573d7ab5bed36b451e124b5e66cbaa1e37e0edaa3ccb5b866e56cf51276442bd207346b
-
Filesize
108KB
MD5232972840222ceeb88c55fa4c72198d8
SHA15925b3e6c877c519a1fadb72c789dcd959765836
SHA25680cb09c74ffb3a4463384b5be8ff4068ac59f5f8938bb755268b457ec3f753e8
SHA512e1e47a088f6c40026c723a8c4582619e773105f253f4f85a28aebc65599826d862de70c57c017aeb53d30054cb428f74b153150b7ec451cf56c2422b467f369e
-
Filesize
173KB
MD5567c11c89e23b4dca72a93300c93bbb4
SHA150274a4ad5fb4604377e69ba7c0f5ee6bc8c9dcf
SHA2566e7900858773927ae5c75a4eaede5014a2970b185f34e3eebfeaf41165646bc2
SHA512fbfd1221221b123ff9b7fbf9f1967ecfa1b3eb4af5f81d86d63d3fbf413bfd9af81ee2596993f74cda470640a13644054ea5f4ab0e5b88ea1fba2e73775821f7