Analysis
-
max time kernel
147s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
05-12-2024 22:02
Static task
static1
Behavioral task
behavioral1
Sample
fd715916260b75edbfc640c0fdbd5d641953b93017168bef4f0ec77d9cf34bdd.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
fd715916260b75edbfc640c0fdbd5d641953b93017168bef4f0ec77d9cf34bdd.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
fd715916260b75edbfc640c0fdbd5d641953b93017168bef4f0ec77d9cf34bdd.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
fd715916260b75edbfc640c0fdbd5d641953b93017168bef4f0ec77d9cf34bdd.apk
-
Size
4.5MB
-
MD5
3b4a9db4f4ad949b7974f83eb9d8ce66
-
SHA1
39a50e6b9f4c3d45a73cd3fcdce589485f013580
-
SHA256
fd715916260b75edbfc640c0fdbd5d641953b93017168bef4f0ec77d9cf34bdd
-
SHA512
f1a1a88e9387bda63f65de3381912ec078dd30e95d9543558fe5798a13e4309a6e4e09e1aa5a15351349dc3679c736968a95685c358e242764363e27f0e1a5bf
-
SSDEEP
98304:kPaNJoNG7AGdM86aSINknxdzl74QJxe3ZPHO7AFZYgBbMXQF:nbMeM8fjknxMQ23Ja2ZYEbSQF
Malware Config
Extracted
hook
http://94.141.120.34
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.udyfmmpcu.romkvoabc/app_dex/classes.dex 4931 com.udyfmmpcu.romkvoabc /data/user/0/com.udyfmmpcu.romkvoabc/app_dex/classes.dex 4931 com.udyfmmpcu.romkvoabc -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.udyfmmpcu.romkvoabc Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.udyfmmpcu.romkvoabc Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.udyfmmpcu.romkvoabc -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.udyfmmpcu.romkvoabc -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.udyfmmpcu.romkvoabc -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.udyfmmpcu.romkvoabc -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.udyfmmpcu.romkvoabc -
Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.udyfmmpcu.romkvoabc android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.udyfmmpcu.romkvoabc android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.udyfmmpcu.romkvoabc android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.udyfmmpcu.romkvoabc android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.udyfmmpcu.romkvoabc -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.udyfmmpcu.romkvoabc -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.udyfmmpcu.romkvoabc -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.udyfmmpcu.romkvoabc -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.udyfmmpcu.romkvoabc -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.udyfmmpcu.romkvoabc -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.udyfmmpcu.romkvoabc -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.udyfmmpcu.romkvoabc
Processes
-
com.udyfmmpcu.romkvoabc1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4931
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD51fa075d6a84789ede11026224fea05b4
SHA10483c0f774e120dd6b09a362520685ac968dc6d7
SHA256d64f3070235d0cc4cc39ba239fcbc542cc9a991e87a6d1261e47d1012fe706aa
SHA51202f9afb16ce2e4d1f2cf89dc67e076cb8d598f208dc26edaa14ad8b241ba40b1ad79bd5cd39c966df760aa1e8fe73d3ea0fcbae11906e82029775741867f5c70
-
Filesize
1.0MB
MD5a7ad2af4d63eaf2dcbb21682800ae15c
SHA126b6d7a28dde8bc99cca8e9502f5faf24be412e7
SHA256b4978641c5bcd33120c606b8f44c605f500fe7ca3def7ec79ba3c6ab5d1e4d59
SHA5124ca05693ba899c287af2befface20de274423ca406f619c15ebab4cf3eca1a986653e158c2af37f1edfd705d5968952676fe227ec6fa712b5fc41a8fe0c5e2ea
-
Filesize
1.0MB
MD530c08a571535168837ca595efabbfa1a
SHA16bf1bd00f8801ba9aed642e535f2d78365230bf2
SHA256e23054f13a593bb42d7cdb90b773da5befb23e0509f0f04fbfb80dd3def6debc
SHA5122fa3401efdd677723ae8cdd8a40719ca20ec140097a4d44a505c1f19587951380b1601869ddb04030d48d38f087f00b87f7bb6d490817754bf868931aeaaf055
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5527b69921c95b6606fd32f886dcb6bcb
SHA1a434326ad6d110ea526ac6a2ce8d58ac7eae9bd5
SHA256d3fbe3ff08875d345da4e8e37ac95efdf4927621c70925cb10f8a75266861fd7
SHA512d8338a691ea697c4f190b12390c2bb97d49b85fc5621791be030c64559839a7627d5f9faa6416af83ce44c58efd5a94ab9729b9299808530a6f59d8f2df4337b
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD565b18acb1df064dab33180b3fe172ba7
SHA1fe4c297c12f575b9d8f09d8753148535166eb79e
SHA256424ca2fcbbaca3bf2adff1aa235b4bafaaaba0fc23dc2597f084cf1c86c9a886
SHA51290c6602e021c94c7ad58951c1fbd232733fe7367e7804133ddb71309cf13f94175f030c0f099d6ace7f82be81dabbf424184f17c3555cf930ff97bda14facbdf
-
Filesize
108KB
MD52a2e29000b476bd8664e2740032ff020
SHA1a7ff9c3946fe9c87f53bcbdc4108d298ccf7cf4f
SHA256ae65e0e42e5d8751009269e93ddf15425de3ac245b46c85ad64645d40431c460
SHA512ebae236823fb2736466cb3397bf40cb9f2ffdc175da430e46423954bd472820d7e0a9852dd7012c08ab835f6f6cf9767bb168132c875e2274e661fe8d10a3f06
-
Filesize
173KB
MD564204e43238f9668ea801b6608fb8c75
SHA1a142e205680ad9378703a11e228373a7aca7203e
SHA256fd8685d05e2bcc425b7f981ad799d42137101dcc1b9f0b5180df668d6c42c248
SHA5126c10932af6677984198e50f9a47ac0ef7e8ee65a3540d930b33f23fac363909fc566684abae14553eb55926b1cb2ab26aaa5776f395bdab329b80f921ac501e9