Analysis
-
max time kernel
150s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
05-03-2024 22:01
Behavioral task
behavioral1
Sample
fee9632fb0d203d1e945339015252b8c4f0f326c3094b93ddc14ab7806ad80f1.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
fee9632fb0d203d1e945339015252b8c4f0f326c3094b93ddc14ab7806ad80f1.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
fee9632fb0d203d1e945339015252b8c4f0f326c3094b93ddc14ab7806ad80f1.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
fee9632fb0d203d1e945339015252b8c4f0f326c3094b93ddc14ab7806ad80f1.apk
-
Size
1.1MB
-
MD5
7f3fbd968788cd060ed891149d7019e8
-
SHA1
8c06f8c0db215d1b592b8b36581270f6f8b07bc6
-
SHA256
fee9632fb0d203d1e945339015252b8c4f0f326c3094b93ddc14ab7806ad80f1
-
SHA512
2a2c26757f55fc7796d54e59a41432c95959e0d54b4d49c8435f9d75bd21c90466f687af440a38f9a0ced73f5c0a8c0148d32a5d9677cbb2551ec35a94586f2a
-
SSDEEP
24576:votkkugX/a0C9GbCJy8MkBUWjXuoE/oJyONg/Pe8TW:AtkkTa0O5UkW/tONg/nW
Malware Config
Extracted
hook
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.kicozapiruxesati.tasulu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.kicozapiruxesati.tasulu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.kicozapiruxesati.tasulu -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.kicozapiruxesati.tasulu -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.kicozapiruxesati.tasulu
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5c6dbe4972f3b70af442a51c7c843f17f
SHA13cc811b989c81f4782b62b976b7e0730e6057c52
SHA256ea89e72be0dee69b1f6d715062e73bede7cd1bc43d5037fcfb5b1f96fa1291da
SHA512e549daeea3107ee5aac5f30177797c17ff6ceab61990653e5a1f61c6e4a4c40a9ff0a308c050f8b06d2d524ef011abd21f6fc60e22ccad31fb99110f6244afc7
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5b2b62538f13bb841158fd4670f9ac45b
SHA129d9de58d7f61081bfb332db469af6d570e969bc
SHA2565f6381aae8d2cfc19806955385712a3af9325f573912e85485ccdff513664991
SHA512b6b2f3d5c57a0f528132e3a4e35f72b996860d7e2b75b642de6310f94b01babce22dcf2dd7ad5d91186a663cfaa99fce0f21654cc1215b2cb42f49bcf01a94a0
-
Filesize
108KB
MD53b6108a3607946269f53cc9a9eb1ce8b
SHA1edf890ac814433c5f192e6016b5bf20aa09e97a0
SHA256bc064715a9dd946c00d138f689ea56458f7839979d746a06da30a2570737e72b
SHA512953c97a4f6f46850b1ed38b2277fd01c7e4d6b19ceee361a61574763821648bd65265e3d4c7b0122d70e237c757b60d5ae9cc742e8080626ea0ca0ea3874f7e5
-
Filesize
173KB
MD544e2780df0605c3678b54b38b44e524d
SHA14b3d2aa26b84e1e3ba84a31d80609e0e1f43208e
SHA2567d49db8f392e68b05abfe78cbef1ddb7170b612c3ccebac47da459abf53c20ef
SHA51287c29ba50eaca540ae5e42be71188b8851078ced71183843b46aa2c470f035c03edf08dd07de941ca751d701e0c7583723047c7beffb25e7633ba460c2f0a880