Analysis
-
max time kernel
47s -
max time network
147s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
08-02-2024 22:15
Behavioral task
behavioral1
Sample
4e4095098376a1f4d6fda6a5047519a252d27853a3cf4def5c6e731a21592cdb.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
4e4095098376a1f4d6fda6a5047519a252d27853a3cf4def5c6e731a21592cdb.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
4e4095098376a1f4d6fda6a5047519a252d27853a3cf4def5c6e731a21592cdb.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
4e4095098376a1f4d6fda6a5047519a252d27853a3cf4def5c6e731a21592cdb.apk
-
Size
1.1MB
-
MD5
5cfd5c4c94f7ddede2ef937bbe5d7722
-
SHA1
60d7e235c38c205d377d7d2e477a981c0629a221
-
SHA256
4e4095098376a1f4d6fda6a5047519a252d27853a3cf4def5c6e731a21592cdb
-
SHA512
f1cc7759849cbf300d885ae618f4771cf65af5ee34396fd831c62179c5a814f6acee73de39e0a26f075083b63a8660d713a18c5ab53781dad03eaa74a8ddbf38
-
SSDEEP
24576:KW4GI8JXs+C85Vv6S6pKZTY//db/C+/IBwjojy/2Pg/+e95:KgFXsX85Vv6S6pcTY/1jC+YwjXOPg/z5
Malware Config
Extracted
hook
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58c6a6f9bb22be65a4bae1e747920cd35
SHA18efdcdadd03af59651a51c35d48c7bd973287e83
SHA2564b741a7958c7a9c53d78788835a422330444dd21963094ea003718dc3b72dcf7
SHA5123d59d6adf1e224d55eea939a267598f2c7b383e542a7bdaada10d168b10848059ae37b1aca31328c6ddf6626c0344047160c821202eccfe1b22b8936dc086c1e
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5dfe2f332ce23a0febd95bb3778f5f995
SHA13bb70a2de15bd329e49a11792091abbc875a3e90
SHA2561d555fc666c2259a0ec15e6a6f05e637a592640953223d092f2d6758f915e872
SHA5123c84942fd383ee15c1ffd3704c04d58f28f784687d675789b23b7683aa6517cc48ddab3225ca9a12ba0d7ea53d0d00cba5323ffc7eb5a13fe1a8536c2d1386c1
-
Filesize
108KB
MD5237547994f98fbb061cf2ac6b99681e7
SHA1121f3498ad7d56856462d6525b116354bedd4bc3
SHA256ee3170324211215a5f12d48c054bb46321470769874485ce616e95edbc7d32ff
SHA51212846e2da33b227394a6d21f863df11a69e69f32d456cb44e5d19527625ffbc4113b67fed6c0c99a5f47b4e47523f568452833ba50f750d61f72f2acb1035572
-
Filesize
148KB
MD59a226505d76146fcfd90da357387bfb4
SHA1c3a1bdadc49b16a1fea69c1e7be38d717ad59c4e
SHA256112b6a2362bfea956f5c8442575689bae91f011f9df903b621e2ace7cce33c3b
SHA512f0384400df370215b9c47ffaeca2cf460b80a691f00275582c9d726324936153e95aff3c34bfa963e420f275bb3c919f854c99f75405775f1e89f30df5005ace