Analysis
-
max time kernel
149s -
max time network
160s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
05-03-2024 22:08
Behavioral task
behavioral1
Sample
0121588ca4de977d77b3492af120588890cf758924fdb3412b780879d8d2192f.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
0121588ca4de977d77b3492af120588890cf758924fdb3412b780879d8d2192f.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
0121588ca4de977d77b3492af120588890cf758924fdb3412b780879d8d2192f.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
0121588ca4de977d77b3492af120588890cf758924fdb3412b780879d8d2192f.apk
-
Size
3.3MB
-
MD5
8d958576257733bd78fe81f84e768ed1
-
SHA1
cd19e464b30b42d80a532cd994828696dc5f7b9b
-
SHA256
0121588ca4de977d77b3492af120588890cf758924fdb3412b780879d8d2192f
-
SHA512
9352203c5c06e69a2521041f3eb4751af80295ac50828b3e6a7d653198e6fb4db671b2fa214e3e3c166cf2a4c22ef54a5e87e40d6ce145a32a5c23b71a487683
-
SSDEEP
98304:TAxM4GZm5vjgae1B4IIDjl5OMxeAPuYXv+r5Pd:xZwMaQ4ImlAYeQuYXv+r5F
Malware Config
Extracted
hook
http://77.246.108.116:3434
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tencent.mm
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5d2e6fb63b84476c7d6051ce548338077
SHA19c5cb629b402934ea6ef4107505fa7505fd27863
SHA256763c87dfb2fb5a1c916ef55405b0df70a3fe0578f287feab38b536816eaf6f49
SHA512b74775bc37888e8654247a16c8fefd1796ba6e623c5a0b51e0a4f317206cbb1403d8f897d7ab9fa4c6e1a97efbf3bad4329ff938f3239ade6e218be6be10ec40
-
Filesize
16KB
MD5b736e5ef55dda71b3f52ee0f823b11c0
SHA1491a7f1fe754c5a58d5a1c97b0cdb221bbb7d8d6
SHA2565ae77f582f5b491308e7a5e969c0b4e05d439e645e8bd2faa3f88ba40d8d98d9
SHA5120064fffa9c6a7becc848407888311b8b7ebdb3856d8ccbd979009d6b71ae92e34c990c7747ae28400bca505b6870a87ad2bbac4dc821c8d5e6fd524ea4eb994e
-
Filesize
173KB
MD5e27bc63e9149652757994f175e11aa63
SHA162bb014407852e9684295e2e929fd5646c41dde5
SHA256e2061e434f372d291f553a0a659f4d268d7384d7bb9cf9700ef83a997f81d35e
SHA512c422551ef7df71908482dd71698050ef52bca5c41107b57b8feca17f6d3b46a4d5f828273f6c1cbb641258b7aa8dece84a6a7eecddd28f34e57b56003c0cd12a