Analysis
-
max time kernel
36s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
24/02/2025, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
d54841a13a8b207b01641b07ec4fb0c4e5afa69f304d46c0ce91ad7425a9d327.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
d54841a13a8b207b01641b07ec4fb0c4e5afa69f304d46c0ce91ad7425a9d327.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
d54841a13a8b207b01641b07ec4fb0c4e5afa69f304d46c0ce91ad7425a9d327.apk
-
Size
4.1MB
-
MD5
c1704623de4f7a3c743e078b57178715
-
SHA1
3b35b2b650c859d7b8a9adeaeaefb4fa98a21009
-
SHA256
d54841a13a8b207b01641b07ec4fb0c4e5afa69f304d46c0ce91ad7425a9d327
-
SHA512
a849aac4f9415ee77e7c71debc6f760dd9fb65fb5449d6f916a799fe8a9c3d06e7adc93871438ca5bd78737c0aa9194b5fb2d141b22b1ecd690ccf2f94365567
-
SSDEEP
98304:pdHpSFqXO3uieO/AAdo00OgjFAAlA7tpbICbhh64:NScOVeTAFohAAliDbPZ
Malware Config
Extracted
androrat
3.6.98.232:18443
Signatures
-
AndroRAT
AndroRAT is an open source Android remote administration tool.
-
Androrat family
-
pid Process 4263 com.tencent.mm -
Loads dropped Dex/Jar 1 TTPs 6 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4263 com.tencent.mm /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4326 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4263 com.tencent.mm /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4263 com.tencent.mm /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4399 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4263 com.tencent.mm -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
PID:4263 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4326
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.tencent.mm/app_mph_dex/oat/x86/apk.manager-v1.rizal.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4399
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5bbe24c4110d44a5ec3367e01e75eafa8
SHA1e84912352ace28202fe9334a5902580e6fe253f7
SHA256d5a06b6b4258766a36ce95e95b62e2a689d7ed5f0086a819e876262e80bf3757
SHA512a8551e696ac6c2ee2b6f9dd5b15b5f0e0d41713e60d6aa8692003605ad297fefbbc172e6c4abfbe32b11c0344dc40e49b3dc7e873e95713f8ab7c75ba6a40857
-
Filesize
3.0MB
MD5c878f4fd98ccf64775a0b0a6e9f558b0
SHA15074117e574373371d0481e1fcc2ecbaf67d5bbd
SHA25619cbb79dabd98b893fdfb56aa6c053abad9bb6c1e99b76f70daae9cfad2bfbe4
SHA5129ff99b2c911bccdec4b5a4b9f4a32ef6fc234ebf174001f2aac102d27b8b98d73ca1da31671d822eae74f21ee752ffd20d1125a38a6f7727e9061690b6b7a989
-
Filesize
8B
MD59b4a743c0797017d478081255ad1d461
SHA1cd13826884ae92ea61eb45492d03e2014f01ecd6
SHA256e1225dac458a41aa015af24a2103542e6d9bac8d0d26601707f557fd0bdf75ce
SHA512dfaa0d3926aa0386e63ae839840b2fadfafcc55c1bb5bd0887a928a1216c3931e4cea44f163353156b24762f0c6a02399f6cf26a98363547d70c82f6c48d6b8f
-
Filesize
5.9MB
MD59cec5d29a92ba8c078263c597c10b476
SHA1fd759c66b56450174a86a4e602c48f5b20ea3442
SHA2568bcbf0f407b480288dee410708c3fbbcc49f2094b67000add37bd548a3090c68
SHA5120a76135b4aa44f604595de62ee5959d6bb85e902787b0116f826877c6b54ceec6fc6d3cf6a0a303612ddadbbb12bacd52291f89525d0101d284f41f512db17ff