Analysis
-
max time kernel
157s -
max time network
152s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
13-03-2024 17:59
Behavioral task
behavioral1
Sample
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
-
Size
2.8MB
-
MD5
4e0e33d1fa3467cd88e4ced9cdea8077
-
SHA1
3ddb1492fef6b0951c172a307f759f3dc962e2a0
-
SHA256
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7
-
SHA512
8a91faa21cd9b67103b8ac445d36c698f7d729d7704c8d61407cf1a8612ff68dae8c1c4ff23c73fd82c4090ef82de688a10a5b38de1f0f06b2133d47a73e0978
-
SSDEEP
49152:Pi2q5Mqa4wh8vEZLi5APc/fbmFY8wGfFF5R2o0Rnw0rw2pl3Ft4y4X3wmAC6lg/q:alRavrg5APwbmFY8wGbD2o0lDw2f34RW
Malware Config
Extracted
hook
%INSERT_URL_HERE%
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD59c0ec263fdd0882ffd3a065894273ef8
SHA13313365841eb4dec6aff7bd635decd8285ff4f94
SHA25622cf97bb833973186b030b1013e6e5f1eb3196d09af35c8727116e68081e867f
SHA5120e45e4447c28ebe3521cf2ea66bfa5ea17a543ba69e74611150e9fa7913d525ead2590337c083be45d7ae8721a6586f8ef4d3306e242f090bd691d27ae3379de
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD54d9bafc2f031fee237430d314b291b15
SHA1345f04bda62fb2e050b868de7bf65704870db313
SHA256a927c84125e9812f04f487030fc24f26e503d3460f824967a077e2a6cafd16ba
SHA5120046effe231172cf6a80f316a1d5c514b4dc2e9e3d905aaa4bf1143ad1032bc087354b9e78fb4bbd20b54369a53249ab6271acaec3bc1d3e2947835ed46194cb
-
Filesize
108KB
MD57c00f8f8aa99a818d44f91fe59e6c6ef
SHA153fe7366969e1451276665e62fab79d212f8e081
SHA25623a8787b60f52912aad83339d8a821d3d4698b98dd7261813ddeaecf8d786dec
SHA512d19cab33625768c08c8ae9fce4445645d4c87137776cc16c00beb0da2c3f9cfa83980e1e6e3bb8a3ba1138d3d89263f0cfc5ff8a85491d6419ce36a03f994e43
-
Filesize
148KB
MD5b720b532bd25b49372e09f457dcc8555
SHA1ddc338078032254dd3471957fd66fcad07483604
SHA2566066d180993bd7cbeee9a833b3c5902441754736dbe29e725d7ca0ce79b5f7ed
SHA5125a7a3639dbdb21c85fc064cf28510f3ff405152ae0a14f32d846868c8bd309684cba749803a43dab220b9dc000b34cd6a83cc35bcac44f0fd2a94d26a1a0f505