Analysis
-
max time kernel
158s -
max time network
151s -
platform
android_x64 -
resource
android-x64-arm64-20240221-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240221-enlocale:en-usos:android-11-x64system -
submitted
13-03-2024 17:59
Behavioral task
behavioral1
Sample
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7.apk
-
Size
2.8MB
-
MD5
4e0e33d1fa3467cd88e4ced9cdea8077
-
SHA1
3ddb1492fef6b0951c172a307f759f3dc962e2a0
-
SHA256
dbd8366157d0bbc61a55335d95f595882611ada6ae0acefdd344ec40eba8e9d7
-
SHA512
8a91faa21cd9b67103b8ac445d36c698f7d729d7704c8d61407cf1a8612ff68dae8c1c4ff23c73fd82c4090ef82de688a10a5b38de1f0f06b2133d47a73e0978
-
SSDEEP
49152:Pi2q5Mqa4wh8vEZLi5APc/fbmFY8wGfFF5R2o0Rnw0rw2pl3Ft4y4X3wmAC6lg/q:alRavrg5APwbmFY8wGbD2o0lDw2f34RW
Malware Config
Extracted
hook
%INSERT_URL_HERE%
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.tencent.mm Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.tencent.mm -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.tencent.mm -
Reads information about phone network operator. 1 TTPs
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD57e858c4054eb00fcddc653a04e5cd1c6
SHA12e056bf31a8d78df136f02a62afeeca77f4faccf
SHA2569010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad
SHA512d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb
-
Filesize
512B
MD5fed9ea3bcafb66d06e04625f1672c4f7
SHA160ff2a87d36681a13aae39126b375124747ef520
SHA2560f52126054f1d5b40f7c655121b5512a87a1e16723219323a4e3f2208b0ff40d
SHA512bf71d851e197f66e7f4fbba2d57bf2bcfc3f08837bf8eda7c3f00ad980b803ec220fb6952def6af00c46087f795ecbb749baa684a58882b7795aebb778bab706
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD57d095ad1a0e31a3f810c604a62febfa7
SHA1df68f458f557910ecf92fb334926f7f271399212
SHA256bc20e53de92f07ee381c708c6005cb3207d68f8d15c2a0c0e2788ad1e0a20f31
SHA512da86197bc8693ac6a7058b890cc6173c31dc8368c666576f9996c534deb23a9e3500dd9d05b0848362410302a322e37816a1ed9eec181d10e77d44421de93a72
-
Filesize
108KB
MD5b20d16e7d5d82c9c55de4d9054db2245
SHA17b077d869488b09c5c4702f4d99f43b805de949e
SHA2560e49095049686130119e822b32c4b0c4a832ef6dd277cb48943b3b94bcb433f4
SHA5126cf1e11c6cff033cabd2d29f064c11c42ac024826d32d52a7203021d8451966ed86e790fc65c41e42564697dc122708d8c53c76f4f546b9bb4d4988bde49df02
-
Filesize
148KB
MD56f82890bc0e06b8689c20258e7873bae
SHA102f08dc53266b305c6931a144c0fc5e9cce33d5e
SHA256f8f75b27a45ae2ecc6ad395026da74fade3c4c9cf992f041464a6b7b45d875ee
SHA51284349b60fcdeb717d2f56fe0e09bc935401edebfc22572750790df5c1eb0c867d47402a55f8a69f94932ae72e91ddbdcee192ce5e9a91b067c9be1e8f11d3148