Analysis
-
max time kernel
137s -
max time network
153s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
15-02-2025 22:00
Static task
static1
Behavioral task
behavioral1
Sample
0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197.apk
-
Size
4.8MB
-
MD5
57cea51ae2f9dd757c3a29254d1408f0
-
SHA1
a02db3677599c89d451a1570faed6de33e7786f8
-
SHA256
0de59148f4252b81b2db533034cca0cc393b58cb85ab8bce8c1ae62d9ea13197
-
SHA512
aa7cd526a1654ff6e1d090edb22d01274d568c2fb601a7de345b1a8b538ac18076ba4e22c92b3e8f04e045d12dc7b4d09e06a2963e90fc781db8ecb6e30285ef
-
SSDEEP
98304:4wBQqxi0spTtKKRCWVBmBqSC+dgehxN96bemdEIbvhpkXLb/FR24Vl03B:ZBQqxi0spTtKKRCWVBm8GxzQVdEAPkXS
Malware Config
Extracted
hook
http://176.65.134.87
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xjqhagprr.ahdckqkzu/app_dex/classes.dex 4933 com.xjqhagprr.ahdckqkzu /data/user/0/com.xjqhagprr.ahdckqkzu/app_dex/classes.dex 4933 com.xjqhagprr.ahdckqkzu -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.xjqhagprr.ahdckqkzu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.xjqhagprr.ahdckqkzu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.xjqhagprr.ahdckqkzu -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.xjqhagprr.ahdckqkzu -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xjqhagprr.ahdckqkzu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.xjqhagprr.ahdckqkzu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.xjqhagprr.ahdckqkzu -
Performs UI accessibility actions on behalf of the user 1 TTPs 8 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.xjqhagprr.ahdckqkzu -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.xjqhagprr.ahdckqkzu -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xjqhagprr.ahdckqkzu -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xjqhagprr.ahdckqkzu -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.xjqhagprr.ahdckqkzu -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.xjqhagprr.ahdckqkzu -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.xjqhagprr.ahdckqkzu -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.xjqhagprr.ahdckqkzu
Processes
-
com.xjqhagprr.ahdckqkzu1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Queries information about running processes on the device
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4933
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5e3786247172eab3ac5e91d9fed6bf09c
SHA1b1e3fe4982211fd8aded1208c75b4d5a81e616df
SHA256821272808f377c9670defd46f956ec0371be2358791b275950fd53267e86d762
SHA51293787d1aa9ac1c336658baa3a7a21868011b0c5432b13e0869120e97a1adacd250361c024a03cd52e8fed5679bcc038e8a10fe924b202afe130731cc7eb02e0d
-
Filesize
1.0MB
MD5381b878efdfe711c2abf66329f2c7bbc
SHA19b34b8f015f429b874be34e1a29bdd1a60b1ec06
SHA256ef66773309a97b548c6f5980d89235861498c6f46e799d217164525e362d5b9b
SHA51298b548f70913c05cbe29d281733cf41077c85174619ec32f32d767f608f0da215909e214007ca95d1d7646c1bc689bf4d0f9deac012af9ed22f88c1b566d71d2
-
Filesize
1.0MB
MD55af085468870685341191bc666193c2e
SHA19e8ac95c36bef02efb034075fe3985d06cdfb340
SHA2564cdd856c7a7b45beb163ab3265e7bd5c7ca3e3277fdcaa17f3f336532351dae4
SHA51216d21fcc4949b03725d28573c7905f44a23315f86474d321e04dedaa7ce872c0b182983e8c966fa5d00d363c46b71d93f3fb62ed829f6c3e77ed1e9ef76413f3
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD50485548a07386c851ed020b44b063eb1
SHA1a7d44f5870a1bbfa357d1b687aac79215d831cd0
SHA2561ecc0751d1f20d966fd1cbf43493161ac9181ce427f50a802196ec22db31b548
SHA5124003eeaf32f5c6222d62224cbff69267ca8c7129d21331e51dd57b4e564b77a0b2be8b4ba7803d4a2f22c0f37b236f273effdfa4c223e1e5422044bce02ed05d
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD52203587a971af999b47688cbe00b1a69
SHA137ccaa04ae7289fca3e9b9ad0c56b3e18df38950
SHA2563d6c6707d99a21f7796a28b531096bf6d7d753579b165b138d03cda0f2323786
SHA5124e75881cc501dc4829a5c6827208194a01ac23a675b8a91f091eb98897ee342cc757bdc8b89d16229eea8c1c3756a0334075da42f771463a060357f30a3bddb8
-
Filesize
108KB
MD5205d5c24d99ece79ca0e9771510ca1b8
SHA138b46d9bb6597b668d67e49ec071df74467a0396
SHA256fc74a4fca267c0fd7d3dbaf9dcff994f61320a8ffd67fb037599f4c5d8f6d9b0
SHA5126e78383bf54adf922ff3a0dbd4afedce7055aaef23e4a696d836ca90da415155568d14bda200b231b5ceb54c15c1d018ffa9f96ba1cefae9eb782e0cc3023263
-
Filesize
173KB
MD520daf0e415f28a18f9f417d26c1098ab
SHA1ebcba07163c4168adb836fe3d3d8c2f0f789aef0
SHA2563fbdf338ab91ef7a032e02ec122d05d1766bce6a7d27a7c3fbf1f7d1c5fd0f11
SHA51292dfaecd897f10fdae49962e23894f9fbe12d3bc6a0c56b0a0e1df484679a509fb8b1c73c1ee2021f12bc1f7d9c6515ba6e0aa73b3b7dc003842cb221ba629cb