Analysis
-
max time kernel
48s -
max time network
135s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
05-03-2024 22:01
Behavioral task
behavioral1
Sample
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04.apk
-
Size
2.8MB
-
MD5
176c428b54970b3bbfb6931ead77003c
-
SHA1
6b056ff3c8dc76a62a96231abdf95f8f04b7ba2a
-
SHA256
f9db7aecc5c0a5102fca21c0166cf2b4d00150ff1adb8fbf609c09461dcf8c04
-
SHA512
e7ad56235fedfcf92a79cae4755afd9ea158249cb218098bfb3dce82824d37acf34506510fd011babff6266097ebdee4b21fc7f6c8c9a72ebdaed4ae72d2af72
-
SSDEEP
49152:zYHNjVlWPHYX8248jyBNDlYS9qBVSoAhtSsuhaEdn5PowLbo2msM30knQsPCJ2DW:gtVCu8248j2NDlhqBVSocuhaEdn5PowV
Malware Config
Extracted
hook
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cixacepufafikabu.golegupa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.cixacepufafikabu.golegupa Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cixacepufafikabu.golegupa -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cixacepufafikabu.golegupa -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.cixacepufafikabu.golegupa
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5925d3c5215bd781aabf85e1edf367341
SHA176711375f8471d34a49a3738e54a268c1d3fe0df
SHA2560b57ad7785da7262d1929a4a67d4de02f1babbdd30dffbcde4fc8254e0e055fe
SHA5122d7a22fb261852efed531914e2eb3c6a945438961e7912a1d9db5b967087a1b1eecdd63003456b7ac51251e25a901852bd47d95e0bb66d3ad6a5ba9b255e2bbd
-
Filesize
16KB
MD55491eef826eab4eb635077db3676a2ed
SHA1dc22f3eb54ff78cb6646ad4239441981c1d62571
SHA25645dbbcd8180da31d5951162d2d4131bf71da9d012fd92b926cb87fef5886d8c2
SHA512d1b5e71451028a7eeb5d0896215e6f1ea7b0d9cfd0059eab0bde7bcb2436b59ef86a3d6165f357ce2f9cd6855225548cfbcca79513f4e097190b5d12b705e031
-
Filesize
108KB
MD5d68efdb9c4011322fddfc416683754f5
SHA1c79b18468ceb042eecd5e965e3b3c5e29405864e
SHA2564aab46609d2ca6756f54bd7bf7040b1e3e9172d4d3793e7138feaa938cea15b9
SHA5123f86a14c4d501b6f9d9fd06d8eea299c5acad5375d39fdc94651cd50b0517db009ca7eacd020b3caa05ab579e6e08c5fc46a312aa8bf5cc2d4254a4acd978fa0