Analysis

  • max time kernel
    47s
  • max time network
    147s
  • platform
    android_x64
  • resource
    android-x64-20231215-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system
  • submitted
    08-02-2024 22:15

General

  • Target

    4e4095098376a1f4d6fda6a5047519a252d27853a3cf4def5c6e731a21592cdb.apk

  • Size

    1.1MB

  • MD5

    5cfd5c4c94f7ddede2ef937bbe5d7722

  • SHA1

    60d7e235c38c205d377d7d2e477a981c0629a221

  • SHA256

    4e4095098376a1f4d6fda6a5047519a252d27853a3cf4def5c6e731a21592cdb

  • SHA512

    f1cc7759849cbf300d885ae618f4771cf65af5ee34396fd831c62179c5a814f6acee73de39e0a26f075083b63a8660d713a18c5ab53781dad03eaa74a8ddbf38

  • SSDEEP

    24576:KW4GI8JXs+C85Vv6S6pKZTY//db/C+/IBwjojy/2Pg/+e95:KgFXsX85Vv6S6pcTY/1jC+YwjXOPg/z5

Malware Config

Extracted

Family

hook

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Acquires the wake lock 1 IoCs
  • Uses Crypto APIs (Might try to encrypt user data) 1 IoCs

Processes

  • com.tencent.mm
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4917

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.tencent.mm/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.tencent.mm/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    8c6a6f9bb22be65a4bae1e747920cd35

    SHA1

    8efdcdadd03af59651a51c35d48c7bd973287e83

    SHA256

    4b741a7958c7a9c53d78788835a422330444dd21963094ea003718dc3b72dcf7

    SHA512

    3d59d6adf1e224d55eea939a267598f2c7b383e542a7bdaada10d168b10848059ae37b1aca31328c6ddf6626c0344047160c821202eccfe1b22b8936dc086c1e

  • /data/data/com.tencent.mm/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    dfe2f332ce23a0febd95bb3778f5f995

    SHA1

    3bb70a2de15bd329e49a11792091abbc875a3e90

    SHA256

    1d555fc666c2259a0ec15e6a6f05e637a592640953223d092f2d6758f915e872

    SHA512

    3c84942fd383ee15c1ffd3704c04d58f28f784687d675789b23b7683aa6517cc48ddab3225ca9a12ba0d7ea53d0d00cba5323ffc7eb5a13fe1a8536c2d1386c1

  • /data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    237547994f98fbb061cf2ac6b99681e7

    SHA1

    121f3498ad7d56856462d6525b116354bedd4bc3

    SHA256

    ee3170324211215a5f12d48c054bb46321470769874485ce616e95edbc7d32ff

    SHA512

    12846e2da33b227394a6d21f863df11a69e69f32d456cb44e5d19527625ffbc4113b67fed6c0c99a5f47b4e47523f568452833ba50f750d61f72f2acb1035572

  • /data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

    Filesize

    148KB

    MD5

    9a226505d76146fcfd90da357387bfb4

    SHA1

    c3a1bdadc49b16a1fea69c1e7be38d717ad59c4e

    SHA256

    112b6a2362bfea956f5c8442575689bae91f011f9df903b621e2ace7cce33c3b

    SHA512

    f0384400df370215b9c47ffaeca2cf460b80a691f00275582c9d726324936153e95aff3c34bfa963e420f275bb3c919f854c99f75405775f1e89f30df5005ace