Analysis

  • max time kernel
    52s
  • max time network
    185s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240611.1-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240611.1-enlocale:en-usos:android-11-x64system
  • submitted
    20-06-2024 01:13

General

  • Target

    c5c5a99fb79efb383586ed7f7e16419dbb2b02a829aa0f976eadce9581edba44.apk

  • Size

    1.1MB

  • MD5

    19233c714b168ed889bc3132322b5214

  • SHA1

    36bff66bb8acacbf57dc44bf139fc1099bf0a121

  • SHA256

    c5c5a99fb79efb383586ed7f7e16419dbb2b02a829aa0f976eadce9581edba44

  • SHA512

    ee9071f50fd68554089f72fa181f96e0bdeaf9f601ef7a75a583c84c4aee28314ab30c2096a076a11e8f2144cbc5033b1c3060b503db72c6cd806e8eda00ba27

  • SSDEEP

    24576:rBRCWXTcC/roY/8CyYApbOU4W6G/ojh0Pg/XLEh:jz3GyU4g/g0Pg/oh

Malware Config

Extracted

Family

hook

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 20 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests enabling of the accessibility settings. 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.sonirupiwebidoti.geyosego
    1⤵
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests enabling of the accessibility settings.
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4700

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/com.sonirupiwebidoti.geyosego/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/user/0/com.sonirupiwebidoti.geyosego/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    71d933482fca54f9471869ff19009c50

    SHA1

    174cf283cd4d226ce154feb577df92f976959a5e

    SHA256

    4b3d1b1684e546db938a612ae851e6e1de0d9a5f3185d4abde05d5130b8bc292

    SHA512

    ec17e9d914f53d4f147e81a80f7dcf57cd62e58393238911e5c8bda593b8bc5fa7a28561e669a1490dcc90f2914a7e8e2e5173827d6d76cec4da6675650de8b6

  • /data/user/0/com.sonirupiwebidoti.geyosego/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/user/0/com.sonirupiwebidoti.geyosego/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    48c43db644d0181c7dc577f500d0bcaf

    SHA1

    f6163c941efc09e9eb77a0c49781a496e347149f

    SHA256

    74a6838ae46c135249ef685792a8f04019107188667cd8402ffb10b22fb962d4

    SHA512

    ab2dcca855682db80c933854fb98782ad33d896101a2ea1e31138a8d51a11540680e1099ead9f6a4cab071f6820202bca8ef631b1a9fdf95a81a6c7e448ae031

  • /data/user/0/com.sonirupiwebidoti.geyosego/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    0c251661e6caef26ffd581a1d21d6f52

    SHA1

    de960375597f2454ca9cb409c8b4e34137555902

    SHA256

    bd2c889450aa0dc5a301d30cf818bbdd3f16ebb02559dbc00913fe5173832fb2

    SHA512

    9ca8974e0c4a8be3663daa7c2a7718471688bdafe5376609d2afef0e1d5f72f026a69cb15d65a8a0a5acb209609d90c6d35ff65fbd3735a5123946ecd2ef15dd

  • /data/user/0/com.sonirupiwebidoti.geyosego/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    1a80788d59b0601a8d77bf08578eaa44

    SHA1

    15d1620a10c0746fdbb09de7513bdf6d1aa8cb2f

    SHA256

    1ae7111eb32f395c4418dab3d44a88cdfc93fb28427496c69305bca495ad1b07

    SHA512

    44c5b9ebddcd9964f60d77558991328b2984f8bf09ef0f9ea1f3fdcb06de989bd42052d45188032cbb3d95787ed6bfd272f10f17af351729a236c53e57e27c4c