COVID-19 Malware Outbreak Investigation Report
Sample Name: 2j7sxYTjQh.apk
MD5: e9eb39d8880a1a04acc538bb717dc337
SHA1: 13944686c0d6eef8be486306fe8645e2f33c131f
SHA256: 5522a7cc358b4193eac53e620d3baa47f385a04bf3d15d1850076cce9456d5f4
Sample Malware URL:
https://malshare.com/sample.php?action=detail&hash=e9eb39d8880a1a04acc538bb717dc337
Dynamic Behaviour Analysis
Antivirus / Scanner detection for submitted sample
Detected SMSWorm
Multi AV Scanner detection for submitted file
Checks if app is currently debugged
Might try to detect if ADB is running
Reads the serial number of the device
Tries to detect Android x86
Tries to detect the analysis device (e.g. the Android emulator)
Uses the command line tool ping to scan for other devices in the same network
Accesses /proc
Accesses android OS build fields
Checks an internet connection is available
Checks if a SIM card is installed
Checks if phone is rooted (checks for Superuser.apk)
Checks if phone is rooted (checks for test-keys build tags)
Executes native commands
Found suspicious command strings (may be related to BOT commands)
Has functionality to send UDP packets
Has functionality to add an overlay to other apps
Has permission to execute code after phone reboot
Has permission to read contacts
Has permission to read the phones state (phone number, device IDs, active call ect.)
Has permission to send SMS in the background
Lists and deletes files in the same context
May access the Android keyguard (lock screen)
May query (preferred) Access Point Name (APN)
Might use exploit to break dedexer tools
Obfuscates method names
Opens an internet connection
Performs DNS lookups (Java API)
Queries list of running processes/tasks
Queries media storage location field
Queries phone contact information
Queries several sensitive phone informations
Queries the SIM provider name (SPN - Service Provider Name)
Queries the SIM provider numeric MCC+MNC (mobile country code + mobile network code)
Queries the list of paired Bluetooth devices
Queries the network operator name
Queries the network operator numeric MCC+MNC (mobile country code + mobile network code)
Queries the phones location (GPS)
Reads boot loader settings of the device
Requests potentially dangerous permissions
Requests root access
Scans for Bluetooth devices
Sends SMS using SmsManager
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Tries to detect QEMU emulator
Tries to detect Virtualbox
Uses reflection
Android Info
Android Type APK
Package Name com.halorozd.meditation
Main Activity com.halorozd.meditation.MainActivity
Internal Version 3
Displayed Version 3.6
Minimum SDK Version 23
Target SDK Version 30
Certificate Attributes
Valid From 2016-09-23 11:57:06
Valid To 3015-01-25 11:57:06
Serial Number 333a0b9b
Thumbprint d122d9adc3e5d5ff346b32c0413f5cf3a3cc4658
Permission
android.permission.ACCESS_FINE_LOCATION
android.permission.SEND_SMS
android.permission.INTERNET
android.permission.ACCESS_COARSE_LOCATION
android.permission.READ_PHONE_STATE
android.permission.READ_CONTACTS
android.permission.RECEIVE_BOOT_COMPLETED
android.permission.VIBRATE
android.permission.ACCESS_NETWORK_STATE
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE
Interesting Strings
https://awsdus.api.p3insight.de/isupload/upload_check_lumen.php
https://d1byvlfiet2h9q.cloudfront.net/InApp/resources/adInformationDialog3.html
https://d2to8y50b3n6dq.cloudfront.net/truststores/[PROJECTID]/cdnconfig.zip
https://d2to8y50b3n6dq.cloudfront.net/truststores/[PROJECTID]/truststore.zip
https://geoip.api.c0nnectthed0ts.com/geoip/
https://geoip.api.p3insight.de/geoip/
https://info.startappservice.com/InApp/resources/info_l.png
https://play.google.com
https://ul.api.c0nnectthed0ts.com/ul/v3/
https://www.com.startapp.com/policy/sdk-policy/
https://www.jio.com/api/jio-recharge-service/recharge/mobility/number/
https://android.googlesource.com/toolchain/llvm
https://android.googlesource.com/toolchain/clang
MITRE ATT&CK® Techniques- for Mobile
Tactic Technique ID Technique Name
Defense Evasion T1406 T1523 1. Obfuscated Files or Information 2. Evade Analysis Environment
Discovery T1421 T1422 1. System Network Connections Discovery 2. System Network Configuration
T1430 T1426 T1424 3. Location Tracking 4. System Information Discovery 5. Process Discovery
Collection T1432 T1430 T1507 1. Access Contact List 2. Location Tracking 3. Network Information Discovery
Command and Control T1573 T1219 1. Encrypted Channel 2. Remote Access Software
Network Effects T1449 1.Exploit SS7 to Redirect Phone Calls/SMS
Impact T1447 T1448 1.Delete Device Data 2. Carrier Billing Fraud
Indicators of Compromise (IoCs):
IOC IOC Type
5522a7cc358b4193eac53e620d3baa47f385a04bf3d15d1850076cce9456d5f4 SHA256
hxxps://awsdus.api[.]p3insight[.]de/isupload/upload_check_lumen[.]php Interesting URL
hxxps://geoip.api.p3insight[.]de/geoip/ Interesting URL
hxxp://tiny[.]cc/COVID-VACCINE Interesting URL
202.83.21[.]14 IP address
216.58.212[.]170 IP address
Safety Recommendations:
Keep your antivirus software updated to detect and prevent malware infections.
Keep your system and applications updated.
Use strong passwords and enable two-factor authentication during logins.
Verify the privileges and permissions requested by the app before granting access.
People concerned about the exposure of their stolen credentials in the dark web can register at AmiBreached.com to ascertain their exposure.
Contacted IP's