Analysis
-
max time kernel
158s -
max time network
170s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
13-03-2024 14:22
Behavioral task
behavioral1
Sample
a3b73640d3df40f8170d3dfb8457ec143aea6a3859daed3ba70b8ca416a98664.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
a3b73640d3df40f8170d3dfb8457ec143aea6a3859daed3ba70b8ca416a98664.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
a3b73640d3df40f8170d3dfb8457ec143aea6a3859daed3ba70b8ca416a98664.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
a3b73640d3df40f8170d3dfb8457ec143aea6a3859daed3ba70b8ca416a98664.apk
-
Size
1.1MB
-
MD5
bf9bfd9b6139c92df74386c2e224de43
-
SHA1
c60ef6b00fd93ed7595b390b92d833e15edb8812
-
SHA256
a3b73640d3df40f8170d3dfb8457ec143aea6a3859daed3ba70b8ca416a98664
-
SHA512
259d880fc8516827c6be79fc9e11a91512b81a5abe282936988da7168aba0c7a7c0c466760d838110f54f95e84f72d293ee188b605a9cc9a33a35d837aa679d6
-
SSDEEP
24576:XogIZk2MoXAFVDqB3f3KgUX5Ue2s9+iEVj3nIg/Ss3:4gJ2zcdqZ3KZXL2ZBnIg/T
Malware Config
Extracted
hook
%INSERT_URL_HERE%
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD579a3b8fa14c2877d0db92686524e4daf
SHA1f11dcd805a8b711d8a1b8a2f3074fca059306b35
SHA256b62ae8100e058f33092a8d63d41865ebd3a21f6ed9d49ca583b7c4d411f558f6
SHA51217b41dc3db1b155126097f7047e839caba452900eb2f06257d69b745bdfb13d05e1fa826c4133d6ef705670c36b9ea91d159c27beceee4085a18643d05d23771
-
Filesize
16KB
MD53fa8fb3845ba747f4eb854f3dbccda75
SHA1339b4e6ba12c3d220587220887febbb5a95e1409
SHA2566eab27d784b6939c2fc5b9b7eb8468e91f98af4e31d1a1ca8dc03b5f3137701b
SHA51229befb456c16c5eca542df43f156afa938a0bcf608037d99562c0d3524c3641f769641a54667245988d29487bec76f81ae8e368e21430edea86eb46607ccf06f
-
Filesize
108KB
MD5bb5ea37001141f8fb5c745f084992575
SHA18d3cec735174ac2e82b50e6c80b0d5c6993eefa7
SHA2566e4d505c87bdb1f2703224162e3602a626e71149371d0b91afc0ed027648151a
SHA5124cbb6f8cbc2b0120c8a9698a03d7718128e878729d9b9658e8633e6992fa83e0f90d7767e77f4cddeaadadc62064370abe4675ebf551edd8f9e07dd6393d4e66
-
Filesize
173KB
MD5664b411bd0d120658f5ef05141ccf6ab
SHA12a03153bc119782818803efff29fd5b4a9080db6
SHA2568f862d8c3db851a065db1a052e571b2e7b5bac5a3a2a08dd64a5184c2a3839c9
SHA51283af179d4a063d5b79b1369f1b94df3fc0e41f0f8c318fe091735a4e00f0d5b680185d3a96dd6e71c683e0ae452f87aaa986e0f3038d604e98d756d80ea31962