Analysis
-
max time kernel
150s -
max time network
142s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
07-03-2024 10:14
Behavioral task
behavioral1
Sample
cb0851d5c0b5890708efa8d9b745a27f64c4fcdef87179067787dd8ea44e220b.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
cb0851d5c0b5890708efa8d9b745a27f64c4fcdef87179067787dd8ea44e220b.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
cb0851d5c0b5890708efa8d9b745a27f64c4fcdef87179067787dd8ea44e220b.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
cb0851d5c0b5890708efa8d9b745a27f64c4fcdef87179067787dd8ea44e220b.apk
-
Size
2.8MB
-
MD5
dd1d59363757b52f1a3139847fc30890
-
SHA1
38db10d0719d2fdc438deea7ea8fd8e4facdad4f
-
SHA256
cb0851d5c0b5890708efa8d9b745a27f64c4fcdef87179067787dd8ea44e220b
-
SHA512
b23d5ee3aa0f1d277c53bf6d502d805a57e640679488ba03c4f68d4a882f9de6cbb1455e30eefff5181d1f5177178f2f7062c168d28204b3d0509438bef768f6
-
SSDEEP
49152:nozl7D4fxxqNsvuha+i4bLkzLfGqg8k9IZKxfVf65q4h5xxKAC6lg/In:ozls3hiaR4bLkfuqCsKxfV65q47xxDCk
Malware Config
Extracted
hook
%INSERT_URL_HERE%
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD515d0e151fb521f7f483c2d592fd1da22
SHA11ff201f4d779812987a1fe8d5154f87537d0b073
SHA2569785f43a073a942f1a9dc28fa46cae912170d3dbce4eafc244063589768d8560
SHA5120b4ffccdb78592cc2cd7b26c50c6f004b81b3b08b4ef8bd503ae0c992e944a5d708422a8ba2e0e80dba455d28dcda6113e75aad8709e3aa1ef5f7078e5eb858d
-
Filesize
16KB
MD5eb3d25c1fc7092bcbe815b3f7a1c0cf0
SHA12fb5026462bcd821384d646bc8f55691e767d2eb
SHA2565c7bc7b237e2b903ce021bc2d6f5cd1e1f6120165235e45039ea27b69bdc854d
SHA512ec78f64785cb9185001135c7d6d1f1ad459d96ad9c02b4fb474ec8dfdd3c95f379696659106f85b02832d699cccb96fd1393c2fcf1c88d74c651ce733daac83c
-
Filesize
173KB
MD55b098acf1cec060df35324cdee298a04
SHA17c07dc8ea5da92b94acc82b0a28e719901c08c96
SHA2561a1959ccb1aeb0de6dd3d64b97acaf856ab94e5a3ef909ba5bbfba175e250f75
SHA5127018827ac52c5df613a693067c23731157bca245efbe3ecd684f58253d99c7dabbf03905e3fb219b1c55c2f52b08511bc6ce063e5d26cf680325b7221a864432