Analysis
-
max time kernel
149s -
max time network
151s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
28/02/2025, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.apk
-
Size
4.0MB
-
MD5
0fb74af2fa1aa4ee4b7ad0bcd944d78e
-
SHA1
552b5a73ff31cc276fe64cae79beae7e2e3bb1fd
-
SHA256
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8
-
SHA512
13ca1a1667f282879718a90778653e9080d1a39b7fc1a5477a68432f722a10be4a3163110c1e980ab9576528e0bcc45a5d1cb07e751ef0179ddd6f9564a4e65c
-
SSDEEP
49152:5gm5ZaPGRo5N3YeyRZJOzqIQ7TcPAr6pOTPTzUZGoAFbYRVLLw1ZPQJiSxm9TmP9:nw3DHFHpODHjotVEP7im9SeG
Malware Config
Extracted
androrat
3.6.98.232:18443
Signatures
-
AndroRAT
AndroRAT is an open source Android remote administration tool.
-
Androrat family
-
pid Process 4496 com.tencent.mm 4496 com.tencent.mm 4496 com.tencent.mm -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4496 com.tencent.mm /data/user/0/com.tencent.mm/app_mph_dex/apk.manager-v1.rizal.xml 4496 com.tencent.mm -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.tencent.mm -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries account information for other applications stored on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect account information stored on the device.
description ioc Process Framework service call android.accounts.IAccountManager.getAccountsAsUser com.tencent.mm -
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/data/phones com.tencent.mm -
Reads the content of the calendar entry data. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.calendar/events com.tencent.mm -
Reads the content of the call log. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://call_log/calls com.tencent.mm -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.tencent.mm -
Reads information about phone network operator. 1 TTPs
-
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.tencent.mm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.tencent.mm
Processes
-
com.tencent.mm1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries account information for other applications stored on the device
- Reads the contacts stored on the device.
- Reads the content of the calendar entry data.
- Reads the content of the call log.
- Requests cell location
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Schedules tasks to execute at a specified time
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4496
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Location Tracking
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD57caaf4427f6acc3950b1d3ebc80df00f
SHA1333d57b54d19568c9e42a7c7390980fb9042168e
SHA256e0eb90ee2f34e485a846986d0373a240ac78aafd33302e68f42b88cf2a372472
SHA5127e78f7942297a1970b5507882438d3b679a31b81565d6938983951bb2e1842ea822ba6e7dd4737f1cd101855e21d7fe1b91f8ea141bf8f40e2382755102a68ce
-
Filesize
32KB
MD5b84ca221f49f56ff688fbd77b269875f
SHA12b99d98f4c58523b8c7adf4a2ebdac6a3bb3cde3
SHA2567325ead2e503bb80d341c1796f7dd0851b5089511958f09fcb16dd2af8fce31f
SHA51229860393d2a3a22706a41d286448d0eb10b7d70990f848b1bdbb6f359871dcb4503c4acf3363b8b5addf10ea0289a076085a81669e6ce97801214fd085001ec0
-
Filesize
8KB
MD5da1c5afa3314628aa42a4627d2aa69a7
SHA16c2f513b84e474e1d933523f06c2c230a868aae2
SHA25663733463b47414a1ee634e2e3c2423b38ea05ef74c406fd55014e6a68ff00180
SHA51217ffa9ecc5f45f01e8e24fb649d776a0d996c95e5f9cab99b9ab9a8e7e903858fa711ea44818aa81ba8a6eb6545364c3f3a2a4213d67495bdff9488007018b54
-
Filesize
512B
MD501bc20ede1524c45707f3bffde573e72
SHA137c9573f9244a771b7930cc74d0605dedd55ca47
SHA256b2396ccb359f3142a055df35972b72434e18ae0aa5612ef2b74ea5408441e348
SHA512ebb9604b6fb27fc81e1e23c0902fe0dc5c1c93488cf837fc78f2a966c1ca21fdef1782e2e3267aaf9dd311e546f6ffb5377b78f9a4ba5afe2ef4e787ca8b8a0f
-
Filesize
8KB
MD5e05d71eeed7b8db2036708a1951dffe8
SHA1554ba1b8e791348d61c37cdb61a2be9e8d1340b4
SHA256b938777d09c8dd98b1a2ecec29265bb1eed5bb4f1ba2027601e5f754ee7d7f6b
SHA512d90dfd86c60a4cd2e0fcacb2defc70f1da7e48c1150be1f851d3e52003f090d5a264f152c026d38728edb97d9a7888e52e65f0fab92c98c581d2ce5db60cc5a1
-
Filesize
8KB
MD5634efcbdd2d6cc44d7739c24b9a7b4c3
SHA1dd2b5fcfdfa057d65fd90fc3d3c5eddf30bd493c
SHA256bf771f430efc5eea14d7e436e861d4b292b5d94f4506349cfbb67348c7ff031d
SHA512bbc0ba54cb4de18feba5a854a38775de48461ac24857ab0528c8e9cdf0f88c9456dd9a7f52239a84bfda319c37a5d69e4d18a6aeb9dc0e7a20cbab18b123436f
-
Filesize
8KB
MD5b2e07e5fe95e31aef02a901366f92507
SHA186cdb35dc8fd902f1aca49d8b2109f19602feadc
SHA2564ce664a6642a2aefbc4178c10638748eb857003cf9a18a5456fadd269f34979f
SHA5124c1ff5087f5f8a5e408c4eb2ceabb7556b0b698b55ff26a9ae5b9a90ade1d4175c0a8d52dec27ccd50c43411e6cd98edf0e2fe8d6eddb2aeda8dda4d4032c174
-
Filesize
16KB
MD5c40e9cd8541cc67b9566e02dcf370af1
SHA191474f613c918e661598f8cb901a5e1a3ee1fba9
SHA256488d158bc51b804f03fc234e7e6edb4954657a3ebe8390e123d47144b1617fc9
SHA512a6199b01eee060853f543145ed117de69df550e69668c21b8fbb0b9df4b232963e499dea07725fbca70f63717b5c2fcbee9a9beccfa89518cf0884a2f51f7e39
-
Filesize
512B
MD5fbc61849d6b9a178cd3156491e6d15ea
SHA1627974e4a74bd14343312585492637f00f81d648
SHA256f4e23ecf8c8ffbcb6fab9c8d678a88dddb7e1552058d99266e03504238a4bce2
SHA512b2d9aa3e7dc1366baf7917e752fb2e68b596aad144ebf2396e73c96e46729407fe71bb2b36cdce3812ca7f1ca37d40275a0ba0add3b012860e186869b37247ee
-
Filesize
8KB
MD58925d2355279dd6c4e6a51f6a0fe4e47
SHA1dfdc0f7a76e5a8bbf82534bd4638640104af9950
SHA2567dfdd261ef2f77dceeceed500444b2722eb7e5e1f75503938dbd7afff428ca9c
SHA512f82f24d72a0b321e91f31868ba81e94f7f3678c400a6ce106881a636ac286dca87f82b9cec664efcac2b16ce70f55fbb9f73cfaf71b05208174215fc7c76378f
-
Filesize
8KB
MD5be58d6f78e5a302cd373b8694bd4c68e
SHA194820988a25726fc0ecfb0f54ef84be68d8dbe7c
SHA256ee86fca9390a51487a49b2b24ca9151e54306b556ad1c534537653d6bb0f896a
SHA512df4d38f968eeedd0933e8424aa07e00a74dd5967f01280275e948815290c3e9e510189cbb85a85efe7f27a5c51007251052f7db0a1b38484b0b538cf288bfc1f
-
Filesize
3B
MD558e0494c51d30eb3494f7c9198986bb9
SHA1cd0d4cc32346750408f7d4f5e78ec9a6e5b79a0d
SHA25637517e5f3dc66819f61f5a7bb8ace1921282415f10551d2defa5c3eb0985b570
SHA512b7a9336ed3a424b5d4d59d9b20d0bbc33217207b584db6b758fddb9a70b99e7c8c9f8387ef318a6b2039e62f09a3a2592bf5c76d6947a6ea1d107b924d7461f4
-
Filesize
114B
MD5b8e2c12985b78856a51971ad2e2cd66e
SHA1086edf1b42f554a87a7648ace69aec6e1de5a504
SHA256caa5eefa1dacbc2ad62823e5c9b65565c5bc9388adaabbc04e29ed10a3d43909
SHA512dca94455775d25971bd629b7b06a0255f076de634c50e115357e47a90f00b8020f7967036b381673ac59e08bc69f43f54b853226e1096d8e2a320fda568c55ad
-
Filesize
114B
MD53bfd2829976c411144782292b538cf9f
SHA11b2b133c99ecd92253d0c2053599d15e593c16e3
SHA2562db8d44ebeb565d6fbf6a65152f78250e8b8c6839349e5c41e0743c3637a8afe
SHA512115f9a5044432e7bc3d4dc667f53264542f90f1a3a6820ce08b74ae58a1b7cede7ed9c352f46a87bbcbbaef14038a6e0c94c154867fdcf4e2c8cd437d56fdf6e
-
Filesize
114B
MD5e751630f3a1c0c20fda1444c052d2c2e
SHA123a61aee8e03829c33074c5263a728025e016177
SHA256111645383984ec29f8f397a31bc58e21d4e38b8002f45c9b7c6d8dfbc7aba763
SHA51264ff21248b86fbef0f07c27cbf6d39c593c0fc21996d75a03f355c8fabff9e2e8e09c7fac37534b2ec3356db91a8e35df79e656128315b3cb90e20718079bee3
-
Filesize
114B
MD55b3969d94118c2e279f1b72797534281
SHA1b6ebee68979fec403ac6cd0f98a0352b54a56b7d
SHA2566cafe1c85875aa3d2e3869243337996f9e37077278bb2bb3c2da31ed72d0d23c
SHA5123d6179ea87affa41ab32d91f65898f26a4346fee6e5c466b0d31f8a58119da6179421f1f8981111344b54d7417ca1db211bb2a7aa3da3e3a8e6e138045d1dc45
-
Filesize
114B
MD5c16c851dd4aa870e3c68bc9e0c51192a
SHA14f01b8e071303963d51993592cc18a128fa7f1dc
SHA2567fa64ef254608f74ad5e27526db0c1bb480c6204b1b939ead5013426f999a0af
SHA51214e2b1ed3c14b33b68a5c94e1d644d59121e7df89040421ee87e3559ea33f08479029712eb7ee6fc33056e4fdd19286b2ecb34d80e1c087103f78a325d8ce12a
-
Filesize
114B
MD5c382c545707c88354f9d0fa74e0b27eb
SHA13c4ce49cdb57e0b21b526b8ad1a8c379eb4b3b1b
SHA2560050c967fe350d234f7bb1e0661d3a99c9da2f7e9bd94472a69fbb51b7739731
SHA512ebce3419c43adb2480fcf79863894bb6453aef50db32a907d67d2299435befdb50b8b120f30dd53e6174ec7453fb08bf92e3ed5abd4a653e934655e454172636
-
Filesize
477B
MD5a6c5a0ee4c027fcb6798d1ab574108a3
SHA16054a71fe39fe6d53881974bf24b3ab495a06d7e
SHA2567285a07f901f7fc3dd0bbaa82e32bf3dc9eb9e2df9c4ba52834973ea7ca141b5
SHA512aca0918a9e7386e6a7d4a22bedce465aa168ddd17f8ad4cd36297e581319119c1ec508dde98e371bc0b27d963468b2691a623d227a14956e9b8124ae173ad59f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD58f651130f3346357b918a43d6854600c
SHA1c139fe19d9ab5bf38ca3fef577c5744c94191c6e
SHA2568114a51cc598075b98e01dc479b4e8ba0335663ef9761bf14b2aa0f7f463a16e
SHA5122b203d22e7811ecb82f2f1bee6c121dbe2a5e86f307765efce7a943fa2f53d9a795153e31db7eea39e536717a5dc67b07a2e38dc299025057eeb8cc26aa2e743
-
Filesize
11KB
MD56c67d94a917ade34763ebcf52fb291a2
SHA1bbaa4ca101fad9f7723aac9ac264ac93ea8debcf
SHA256bc11e58a0aecd911956f5b73acbd16c0bb5b2936cf0507b15c21cdb4d6107fb3
SHA512aa89ff8308b53a0fd19fd19fab5a5664def071d112d2469f38ff7293a65566a670aa06f4a6c9d92e8eb34aaa8ed523fab2b38a6acfee102b7e2051540630588a