Analysis
-
max time kernel
150s -
max time network
158s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
08-02-2024 22:15
Behavioral task
behavioral1
Sample
b362840bd046d1bd4632ce0cc5409feea4ef868f1f8f3ef1d6cb726a44b280f2.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
b362840bd046d1bd4632ce0cc5409feea4ef868f1f8f3ef1d6cb726a44b280f2.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
b362840bd046d1bd4632ce0cc5409feea4ef868f1f8f3ef1d6cb726a44b280f2.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
b362840bd046d1bd4632ce0cc5409feea4ef868f1f8f3ef1d6cb726a44b280f2.apk
-
Size
1.1MB
-
MD5
ee65a8788025a0cbda72696c330bf315
-
SHA1
8cd6f2398e3ac34a3ae30d4cbfe56385b10987a2
-
SHA256
b362840bd046d1bd4632ce0cc5409feea4ef868f1f8f3ef1d6cb726a44b280f2
-
SHA512
b570ea1b0ca3a1252e2601532022639efa6efa1ada8885413ef933defaee73ce1cd44651a7fc6ec7086fdbcee47ae566d5e045dbbfef4312351bb015bf6a0f8c
-
SSDEEP
24576:MJwCWpW6tMjahNNIDQpK7GFbwjojyGE2g/hVT2:MJwjtMjahNRlwjXd2g/32
Malware Config
Extracted
hook
http://93.123.39.235:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5db4387c3d1fb649fa559177bbf76b4fc
SHA1d22b30916966c862a3d8a378de289b56bfd2f945
SHA2563fcdc4f5bbabcb2ac0a8e2cdfc223c5bfc829c4bb91c6d618644199136435ed6
SHA51206c6032935b17f950ce78bb6d0600b4d5b41e3a4a351d803de18909e0bdd28ae843143a0a236688c7ed0a2b52c9420d950253107ff9524da3ebfa90258f6258c
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5a2d802183a541a5279e8d5cedd0dad36
SHA193c129d0573b3331ac82ae9b3dd8825a853b9b51
SHA2564723fb7d6b86a8558ce4a6533ddf64e9ff38a84899ec53830631e1995890d0a7
SHA51226b6c3b71c1c8ce4e8c914536839fa5fd38e0921d284a20f7f3836ca2c0f90dbef18478d2fb6e4b2b0248e8c07a257970cfa2409df665616d39c15316d93c9a8