Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    android_x64
  • resource
    android-x64-20240221-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system
  • submitted
    13-03-2024 13:34

General

  • Target

    a3b73640d3df40f8170d3dfb8457ec143aea6a3859daed3ba70b8ca416a98664.apk

  • Size

    1.1MB

  • MD5

    bf9bfd9b6139c92df74386c2e224de43

  • SHA1

    c60ef6b00fd93ed7595b390b92d833e15edb8812

  • SHA256

    a3b73640d3df40f8170d3dfb8457ec143aea6a3859daed3ba70b8ca416a98664

  • SHA512

    259d880fc8516827c6be79fc9e11a91512b81a5abe282936988da7168aba0c7a7c0c466760d838110f54f95e84f72d293ee188b605a9cc9a33a35d837aa679d6

  • SSDEEP

    24576:XogIZk2MoXAFVDqB3f3KgUX5Ue2s9+iEVj3nIg/Ss3:4gJ2zcdqZ3KZXL2ZBnIg/T

Malware Config

Extracted

Family

hook

C2

%INSERT_URL_HERE%

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 2 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Acquires the wake lock 1 IoCs
  • Reads information about phone network operator. 1 TTPs

Processes

  • com.tencent.mm
    1⤵
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    PID:5088

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.tencent.mm/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    95fa6623f685f057bb9d0aaea2bcd9e7

    SHA1

    ae3267c3dc4c9986e04809ac875fe371e61ef125

    SHA256

    51d6409da97226db2bb34b3067532d6a76c0bcb6f5690438db02abbcfe032696

    SHA512

    da540fc8306d45fecdfa81ff2b195350f48b8019ba9c617fd147adf9b58a705fcb4fc7e5d682c054a6b877a562d95be9741ffcd0dad708a72faf59a91ddcee0d