Resubmissions
18/02/2025, 20:08
250218-ywn8bsxrc1 1024/01/2025, 04:44
250124-fcwh7azqas 1024/01/2025, 04:37
250124-e8zp2sznay 10Analysis
-
max time kernel
83s -
max time network
152s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
18/02/2025, 20:08
Static task
static1
Behavioral task
behavioral1
Sample
4fcce7c445d89d7de943ec0e0c2fc285d4b25a67950ad7d6bcb50dbcbc4ac29b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
4fcce7c445d89d7de943ec0e0c2fc285d4b25a67950ad7d6bcb50dbcbc4ac29b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
4fcce7c445d89d7de943ec0e0c2fc285d4b25a67950ad7d6bcb50dbcbc4ac29b.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
deper.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
deper.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral6
Sample
deper.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
4fcce7c445d89d7de943ec0e0c2fc285d4b25a67950ad7d6bcb50dbcbc4ac29b.apk
-
Size
10.5MB
-
MD5
8ebf4bdf9326073fa0577a2e1950e1af
-
SHA1
7a30345f421c243cbef4dd42d60f5de45b99d580
-
SHA256
4fcce7c445d89d7de943ec0e0c2fc285d4b25a67950ad7d6bcb50dbcbc4ac29b
-
SHA512
006dd16eee88a56657bafed02d5585d8a04bc98139249f9fb0553382d284a23546071f3bff9e39881150d0ba802f92ac26b1fbd8fb6c5b20f1a6cd6301e40243
-
SSDEEP
196608:3wGdnljZ/MLUBwiwOYTR8dhTVKZZRa+6Gz4+bpRdS388yngsaFf/FYd9r:3VRRZvai3YOBkRTz/RdS3886gl/FYdF
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/nmrdiw.xhckto.wotzbp/app_sheriff/ccLObl.json 4287 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/nmrdiw.xhckto.wotzbp/app_sheriff/ccLObl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/nmrdiw.xhckto.wotzbp/app_sheriff/oat/x86/ccLObl.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/nmrdiw.xhckto.wotzbp/app_sheriff/ccLObl.json 4260 nmrdiw.xhckto.wotzbp -
Declares broadcast receivers with permission to handle system events 1 IoCs
description ioc Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN -
Declares services with permission to bind to the system 4 IoCs
description ioc Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE Required by input method services to bind with the system. Allows apps to provide custom input methods (keyboards). android.permission.BIND_INPUT_METHOD Required by VPN services to bind with the system. Allows apps to provision VPN services. android.permission.BIND_VPN_SERVICE -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Requests dangerous framework permissions 22 IoCs
description ioc Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW Allows an application to read the user's call log. android.permission.READ_CALL_LOG Allows read access to the device's phone number(s). android.permission.READ_PHONE_NUMBERS Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS Allows an application to read the user's contacts data. android.permission.READ_CONTACTS Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows applications to use exact alarm APIs. android.permission.SCHEDULE_EXACT_ALARM Allows an application to access any geographic locations persisted in the user's shared collection. android.permission.ACCESS_MEDIA_LOCATION Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to record audio. android.permission.RECORD_AUDIO Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an app to post notifications. android.permission.POST_NOTIFICATIONS Required to be able to access the camera device. android.permission.CAMERA
Processes
-
nmrdiw.xhckto.wotzbp1⤵
- Loads dropped Dex/Jar
PID:4260 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/nmrdiw.xhckto.wotzbp/app_sheriff/ccLObl.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/nmrdiw.xhckto.wotzbp/app_sheriff/oat/x86/ccLObl.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4287
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
573KB
MD553eeb221635303b30aa63f98d92018a5
SHA10bc80cd5795806afeb684c6a05d5d3a7ba968262
SHA25697e086bd422edfb25b19a5c358135bed6f11f201914b9d5f171bb3da4b24eda4
SHA512626d3acf96b30c202559bb169c46126f0629a549cf568e1b318061434e41273fedb6385a1c91676c95cccc9b8e4a1aa0bb91ff12ba0b1b6df7bf66b597e1782e
-
Filesize
573KB
MD504c0f10a3fa92c116a88892b7215cbda
SHA1595a0efbedb351b9881b56dd4fa6f34a830a7906
SHA2567a239f0cc770425914abd361298e39858b80264408ed6574a27af83da3c1ab5c
SHA51249a7ee1b543716ad6340e5845af7ab151af3761c36ccc52c34c61e54b9993cb6b486f416ac18ad2016852bcdf838c835aa2a5de769bf1015ef1c4441d2825198
-
Filesize
1KB
MD55c44041405cbb31a123fd1db81bc7a02
SHA170fbeb273c5dfce88d1bded88226c8b0c227c519
SHA256c72fda1b26904ed8527784f67eef4a19267491bcc14c0b165019ef3b1a50e586
SHA512da45e885cce6942adf0427035f079041d808d2ab4a55efc60cf5802eb2f4bf8e321a2454af0b63d38be94118849e2bb34b0b86aaaac7fc5ffeeb332f76df1aed
-
Filesize
6.8MB
MD52d34dbb4167ebb371e33f3ce700fdbc8
SHA14a20849866f90262f9a0b2793f84cc7d5e057656
SHA256c00419b21d10a236b47b43bb1eed3dbc5298e471cf9616848a84da5baae8e611
SHA51220365af814427670ea62987e750657a04d03c509382abe655f87952d6794981e7811c0b7aa9dede998263c2e2a98c5c008848324c4e653eba77517fc6c7c034b
-
Filesize
1.2MB
MD5f09ebb1f067a981dcf960761e8807117
SHA1a1c74d99e980dbc9d95444b69c040af946f67945
SHA25634822af6a552029f9ea2ddc173704d7e70a8d117ce422f9cd42bb4484889c164
SHA512ce1134031a3dba59cfa1a7dfb76aee3cbed6d473328edc5bd9994a581205f5bb217734f0037fd17f89f6b1969292e216de095294eb367f88b53aee2d344cf27b
-
Filesize
1.2MB
MD5bbdde0270e2573891dd7872eccfe5a06
SHA1b0ee37a19ab30ae509b1280a217f845d37708743
SHA25601c2dc0c47a460e49a56282e5a3b0becd0b9f260d60139390ed026f83825b570
SHA51241d2ef59b64fb00d4d01218ba84fcafb6ce13532e851d7b8232eaba63e7f18c29f0f5089fc0b22889a6a32c77715fb36ca2b2eb49984d0707b1c28f122a01329