Analysis
-
max time kernel
42s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
20-01-2024 22:01
Behavioral task
behavioral1
Sample
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd.apk
-
Size
1.1MB
-
MD5
6caf066fc1d95379a840f5782f096af5
-
SHA1
351a3ac83a0e5e7100514c2a4bc389ba7ef84242
-
SHA256
ec2cef70ea8ccb4e4c2de3014df002627ea77a1df4aa8ef53d15e0f4832726cd
-
SHA512
3f5715959417bd44115f8888ba947c27c9279639b4af3340387c4125308b24cfdb64ca60d5cace72ba054983427ea298b73f1ee5890a7666350fc4ed77a89fcb
-
SSDEEP
24576:kNpP/joDjIbgXULqg1SX5mLLKq3MaPw1FwjojyEFSg/AqxO:kzHj0hyA5mfh3nY/wjXWSg/xO
Malware Config
Extracted
hook
http://93.123.39.77:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5a5e9e6157a11c1c99e2c6da5d5fc1f9f
SHA10b799b2e519efa9257d69228fc19a3788290b833
SHA256f45532229846648d9f8fe16988d4296cad2dc60ff413d001329d49dce5550605
SHA512d5c41a3f91299dfd9108eb516990441cc0b180e68e1a993638445eb54b13fd708d6e293d29367cfa9b48a5ab27f0053e4d82e72e6cafa81760d639105f20b947
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
16KB
MD5e1cd007c34c7c3f0e060447feed6df47
SHA1f53d6b26f7e9126dc89d89bdb1bde0999fe8097f
SHA256d027b3f8315e4b72b84ff44e64b7f29efe7c21e8e4ae52df62a62ee6d8cde5ed
SHA5129a888fef87362487593716dbbef348a301482a267dbd4f3eddcd6a645c3ca92d06c70e0c65997235edf659a14bd45168babb70cef8d51f4877f66c6527aaadcf
-
Filesize
108KB
MD527512b879aee84df13f05d9b3974fece
SHA135e60c54a5400203a5a51dece9cab1c4849da170
SHA2563913577694d271a2724741f9153fe51496182087f4a7a2843b710bbb1530cb9d
SHA512fb9cb37ccb30896348bcd87e15bd6a03b26198162afc13bdf078fddcff8e8305c92a03479c781eb2657ec7b57a2e3bd6526be197ede1c6f5faccf0845a64d851
-
Filesize
173KB
MD52be30bcd4840a7b33da060ec801bcacd
SHA1662f308bcabdf7c5b67d496fab61dcb2c7abfc59
SHA256170ecd7dd38ab5ed54c985128cecacf7c56804d3ca64b90127b9e59fda2624b9
SHA5129af9bc4d02320b92f7c11affe12463340249c0bebf3b6b1647d5008f3469962a6f6056946f217054f9b128dc750d780b0f97f2c461e6ff7febe1d372cdc01e22