Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
159s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
13/04/2024, 22:00
Behavioral task
behavioral1
Sample
161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e.apk
-
Size
2.9MB
-
MD5
4cca11d4393f5a4914d4b29bea1d0c1c
-
SHA1
28abbf2fc20fd2b6ea38928c673a9dccc879edd4
-
SHA256
161cb0adb67a217c2d58cba21223a972b5e56bb696f5662bda26dc9275dfab8e
-
SHA512
b22e4051eb65d7fafbc75697b540cb4aa4d12677452beb5008b02f5a4bc57f559bff3f6c03a89026fdfea9600c30b7a6ac697d34dce33e73c783848bd89843aa
-
SSDEEP
49152:Ir1K35oS/D8IIfASfxavX/o+JqPI87ctEuiAEaPw4D7w5wlwbNK4dm4g/NJ:s1K3l/D8I7SfxityuuaPpD7wmlwZK4du
Malware Config
Extracted
hook
Signatures
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Makes use of the framework's Accessibility service 2 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.cidusazomawo.difu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.cidusazomawo.difu Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.cidusazomawo.difu -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.cidusazomawo.difu -
Queries information about running processes on the device. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.cidusazomawo.difu -
Queries information about the current Wi-Fi connection. 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cidusazomawo.difu -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.cidusazomawo.difu -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.cidusazomawo.difu
Processes
-
com.cidusazomawo.difu1⤵
- Makes use of the framework's Accessibility service
- Makes use of the framework's foreground persistence service
- Queries information about running processes on the device.
- Queries information about the current Wi-Fi connection.
- Acquires the wake lock
- Uses Crypto APIs (Might try to encrypt user data)
PID:5121
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD58adbefd69f0b453940cf13a1c2c8250b
SHA19a85591de6967fe8e32b04e30eca1a1e275609f2
SHA256b633f72109258491f9275a9ead65c5077a3a28c18fdf42f8ec08a7c32282f94a
SHA51231c1825127bb0792393db789155ecaa6741c833801b2b0bc018d3aaf7892c34c91b18cd1e374bb3f7cd785111f5399a56bde9fa49849cb80fb32a13d5d47f461
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
16KB
MD5bfa48028a10956dd5b460cd7af61e843
SHA1537bac5076756995a76dd950f5e3377073448179
SHA256f8be0d743c9ae75051c83783fd784684d8b52fd59376655fbde91349c758d6c5
SHA5127634d7b23b819a0726fc6c7585a093690f69f59f224cefa9b8e0c618625b5c4ec938a5953819c77f9f165745619df45846309cc4a843c9203d70d27d6a142c71
-
Filesize
108KB
MD571150dc1639a440ed196233b0ae3c8f4
SHA1641e9d3451f8c937ed21f850446cb168eb5f45db
SHA2561fef779f3dedf9587686067040c337fc2f19ebcb79e9b8b6c4d0fe55c4e17fd8
SHA5128a824d21dfa8bc9d919afe0b7de62137707534e56755e4c3357fa7e5bc830138f55d68beb06040bac0f1091e8edae218c3876408eea300cc5293402004fc29de
-
Filesize
173KB
MD55d00134b5e9785f1ba6d6e0252e22327
SHA182d2d30285e49e07ecb92836ba4f3a6c2186c496
SHA25608bfe63f0249b80ff00b9c92baac1ddd2be1229922f3e79f2933b0a1ad92caf2
SHA512b2fe12b440130d4934e0ff057b5b2ec416dde03ac3d22b3e51b47f28ac43c1c0251ee2df436555b4ca93c5be3e4a85df2b6ee9e1841153365764ecd3ca6aea73