Analysis
-
max time kernel
13s -
max time network
154s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
04-12-2024 22:12
Static task
static1
Behavioral task
behavioral1
Sample
4b9df9cf6c17ffce15b2a46cf0ac6b2435335f23d34674e5a2e6973d0f0a3744.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4b9df9cf6c17ffce15b2a46cf0ac6b2435335f23d34674e5a2e6973d0f0a3744.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4b9df9cf6c17ffce15b2a46cf0ac6b2435335f23d34674e5a2e6973d0f0a3744.apk
Resource
android-x64-arm64-20240624-en
General
-
Target
4b9df9cf6c17ffce15b2a46cf0ac6b2435335f23d34674e5a2e6973d0f0a3744.apk
-
Size
4.6MB
-
MD5
86d46ede8ce318e94d8c226403296010
-
SHA1
6dacbc12a42071a77258fc0977a741bff4050ff6
-
SHA256
4b9df9cf6c17ffce15b2a46cf0ac6b2435335f23d34674e5a2e6973d0f0a3744
-
SHA512
f92f167f24b748e56eff4903843b5783345e21bd480341d2168515706b513745e5abe4385f3f02bf23b21b2dc44dafb55140d075e3bf3efa85d81cbfde148464
-
SSDEEP
98304:8r6z7yRHjrLb+luycRm2bvNe9e2WBtmGHYmQm4HDatb6g6TVUnp:y6fCDrPZm2bVyIBQ65YDA3N
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dmhgdwaby.ehntehrvj/app_dex/classes.dex 4974 com.dmhgdwaby.ehntehrvj /data/user/0/com.dmhgdwaby.ehntehrvj/app_dex/classes.dex 4974 com.dmhgdwaby.ehntehrvj -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.dmhgdwaby.ehntehrvj -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.dmhgdwaby.ehntehrvj -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.dmhgdwaby.ehntehrvj -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.dmhgdwaby.ehntehrvj -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.dmhgdwaby.ehntehrvj -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.dmhgdwaby.ehntehrvj -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.dmhgdwaby.ehntehrvj -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.dmhgdwaby.ehntehrvj -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.dmhgdwaby.ehntehrvj -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.dmhgdwaby.ehntehrvj
Processes
-
com.dmhgdwaby.ehntehrvj1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4974
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD546d88f78c226edf8c145b4f299acf3a4
SHA13b203554bcc21fa9e3a745c6f31dd96c3bd21571
SHA2561d9ee88692ea9918e89ac16b73a7e93c0b31ae283865f8cfcdfd143777a012d3
SHA512b443f27d2a4159e3829e2520136653a88c160b9c057d6d591b03b1e34da90b5cfccf55cc2ea3f2dd76cc55901a47b77917c9e380e169fa0f07969c136e376d9e
-
Filesize
1.0MB
MD5de687b18b199c2d7903e8dc44a21dfcf
SHA1279b5d0816ead79e02f7fe8695eb90c393d02db6
SHA256e3cb3c5fc4747a32e745b7e22ddf49bf3b3e0b6e51b6fcc4572411850caa73b1
SHA512075e720ec29a4d08f26f606e81a2f25ef860c09cb6bb0eb02bbadefa016da34f6588391030a77ceb9e1b3e15275a1c1d2f4bb2daf04e3119a6c1d6e88276f0a8
-
Filesize
1.0MB
MD5a220a685cf885ccb4f74783daeac89a6
SHA1d8ec9b5abfd1250a1f138e7dc8285f538f641acd
SHA256ad45c5fd419826fbe7a2d1ddf96a8d8e6eaf6723facf66f0f543620c9e9fdaf2
SHA5122110a7f76daeab5b28429057436886336c8d5b785b89f753fc0ea433b9d647789ab9960c1fbf7a8c50a6507fac66bff6d1c09d750787106cbd1577120f840dca
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5dcb65a88406e1ab2e134bc3dabda155b
SHA1b6ee3c1c83418c83d563398026de446c9b2f22c6
SHA256e629fe44295434b04d590f6454644606c53abeb617cb90f5df481f58bbcae03e
SHA512d0578e7852373f7d45ccad2e7653295e9ca88d4d90eab8be93ca2fb5b44884413973293a4e91dd6cfaedd192e890935faeeb077b562bbd46fc91e7641a791b65
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD545310206442d0de8b12a8b90feec300a
SHA1d46c57e988b2d451bdcd72b83d58e18f4fc59439
SHA2564ca3c66cf467edf07b80b8491fb1e53fd4334c766e59be47b53c807a46eb49b5
SHA51201699ef9790d053e14be1f62137d0358c44af0c397fb3374d58e9527df59b7910bcad0d70e43bd1c823eda8739d0cd1d33bf22e0c77b06029b6d275c265c35e8
-
Filesize
108KB
MD59ac1b2cd6e94b66cb551453b30f9ec4d
SHA160525493fec1bb1df2043026aeaa501ece84c72d
SHA256fa78aebac93d6a90f69a0fd498a691260e37888cf82d287572c13ee1f3c15c0c
SHA51272ecfbfe07ce7423785d0df5067f483e7bdd531ad3353863ad8c60d072f7d0cc0fba059c00714f313ca57887f5e8697b498432f19a8b34ed0623a8736c65f79d
-
Filesize
173KB
MD59ae6f89f3f5e078893d7122c39f3a23d
SHA11a3f734501c959d9dc373fa71c3e0ed6032f568f
SHA256e9ea47f9213bb7d7f0efb7ce7518305ddf95247a31b896a102ff7c170253bd6f
SHA5126cacb3320bbfaa2abd7d0914d57273bda694f9eca23d1c48a1b48d556e288acc66ecc652cd1ca2a4a462b2f20d9128bd49074d0d89d02c02e892b7aa379c581c