Analysis
-
max time kernel
14s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
17/01/2025, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
9df047c6c0aa2e41583af597798157578be1061cd4928576f416c878ff5799e3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
9df047c6c0aa2e41583af597798157578be1061cd4928576f416c878ff5799e3.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
9df047c6c0aa2e41583af597798157578be1061cd4928576f416c878ff5799e3.apk
-
Size
4.1MB
-
MD5
aeee571dad8f7554d81bfeeac515764d
-
SHA1
cbc7176336dd03105aee7c57442f42b61b9d96e2
-
SHA256
9df047c6c0aa2e41583af597798157578be1061cd4928576f416c878ff5799e3
-
SHA512
4ce64b6483b057d32b2097aaeb3d6b85a3f80eff190be07332dfb7d195ec257ae41a06df00fbf1b15b15668744b1e9681612b67edae40e0e7f9f510e2bd5598a
-
SSDEEP
98304:WDnLvW+D1LAowJkdAg2JNp689TZcIlIPQhh685Bm:WrQkdAg2n797h69
Malware Config
Extracted
androrat
3.6.98.232:18443
Signatures
-
AndroRAT
AndroRAT is an open source Android remote administration tool.
-
Androrat family
-
pid Process 4270 com.tencent.mm -
Loads dropped Dex/Jar 1 TTPs 6 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4270 com.tencent.mm /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4332 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4270 com.tencent.mm /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4270 com.tencent.mm /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4379 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4270 com.tencent.mm -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4270 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4332
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4379
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5c018278da756f85b6fd15c539cfb8a97
SHA1a4c1229550dac47f048bd971d4e432c7d8e1be5f
SHA256fe3c554585d8b20474ce5ad3008f00e5526307c2b1e6f273b95510c000443f6f
SHA51210c3ecf9ab6b92dd91a60e42dff320068c42b2f853460b88aa88ec378ae3efc6fe75f27f11eeddf313cc7d99a34acbcb3c998b0f9d668d74d96141f8b7a11310
-
Filesize
3.0MB
MD5962d4011e0666996c837efa7d750f217
SHA16d468c99e9c3ea8e506d6169495b00f14e24b690
SHA256a5839c587d77a4be3daf4003048adc02a5c65fc52d99bbc349981578f821baa4
SHA512a3953116ca4a68426b0ab57c93d40f7393e3c33ea834559a8d2a67cdc62d7353ec77776b5b946e283deeb5adf94c791e915592647193728aea6f5d5103a5dbb8
-
Filesize
8B
MD57ff6baacec55a804ae51a9d6c3ad30ad
SHA1c4a110cb7b6eb52083f096fdb7190f0913fdec12
SHA2563db2dd76f3aab7a5f56ad5e8cfdb15e3d1eac8d1e88c41e3d5e1a5f0cd06f54a
SHA512d76524e6800a1bf7ef5fadd735b7b975a0a7df55c07807b9935235334e4bd37350cc53bf98a22e2bd35019dcbce6b0d75480efc5e012e085330d92f88829bf9c
-
Filesize
5.9MB
MD5e887e895ca08c8067f887a14a6d14052
SHA1fd085fc9a1217b5bf3bfc00715dfd8e428004f0d
SHA2564066590b20d80c3a0c5edf78dbb273aa98ca044cf43e15a5beada727362419a3
SHA5123139f507018427c7672ca6379beea8bda8dc52ae26fbab6d86ddf385d2cfd441b17cf830240fa9755e8ed17bc6642b89d04c696353d9e7f118c1e6dfc8ed76f9