Analysis

  • max time kernel
    178s
  • max time network
    188s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    28-07-2024 22:00

General

  • Target

    fe3bd3410a14aabdda61db0e8e41ae4fbbc87f2299ce0fae66b6cb6bfc8947fc.apk

  • Size

    2.9MB

  • MD5

    073c66d18320a3fcfa115a0a24ec700d

  • SHA1

    d1e829e1ecbb95ee4c2fa1b1274759d13b76eab4

  • SHA256

    fe3bd3410a14aabdda61db0e8e41ae4fbbc87f2299ce0fae66b6cb6bfc8947fc

  • SHA512

    02dfd34aef6e592b2d7311c89fb8f63c97b4754e9d0c48bc65bf7c95e5c1504242d0fa981f91d5514da91ad528af9a8058bc6d59dbc35eee08ed244ff50bb2d5

  • SSDEEP

    49152:xhkj3wPACt+cyg7biCdeWg4TmT/yUi/yfQg/AS9cXJYVJhRBn:jkLoACJykeroI/ylA25JYV9V

Malware Config

Extracted

Family

hook

C2

http://45.66.231.11:3434

AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kakao.talk
    1⤵
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4627

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kakao.talk/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.kakao.talk/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    7ecb6fe1ea3cecd899c36c27ba728a57

    SHA1

    a2da182da90013d2e69eafada9f1e6866b05d230

    SHA256

    393f69400df54a846466b181f08239fa211bd5add28d5246405c63025f51983f

    SHA512

    2817badd762a0daecb71b3a568c2d34ea668d2ed03b00d3530493854343d78d4b859289aa94f34406241d8c21526b0134b67959acdfcd40d289169c7eedfb270

  • /data/data/com.kakao.talk/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kakao.talk/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    12867ec146f39c9763d629d535c452b2

    SHA1

    6367eddcf5394ea331a6fb54feffacc06ad4c2e8

    SHA256

    92414507de62e3da9ea4c0082d75f711c891a3887751ef0362badf445ac4f56b

    SHA512

    e7acd365bd0032adc89f0fec0796bb5e3ce32f81956c89de98042318f6488a82eec5ef49d264d8d2c3e2ed4a7d98528184488b27e7e9e65003d5ab01e7d08c2d

  • /data/data/com.kakao.talk/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    70b53f635882aa5cf546a9edcec8b486

    SHA1

    d19c9cef5c07a9ddbd45cb8c8d800d9cef8f19ab

    SHA256

    ab7c4dcf10f9547fd37e04ff85d34f774a9bc34cb065c02fdb8b431f42318ad0

    SHA512

    ca664d697f446cd8e6c50cca4615c7db68d3978ae512b3ae8a47ac9c7a0949c4b0865dd305f543a18d74b4a085724c43f20de90eecf1305ac2dc08f694bef9f8

  • /data/data/com.kakao.talk/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    d35c09c9e4d7ec72ab116682e5212912

    SHA1

    06fbe09df5319d3cedb1b1ab01412f498a83940c

    SHA256

    015044dfbd53f1515eeaad63bd35466b30137f57840664b6a4fd4340f380b7c2

    SHA512

    a2a9be879d9a48241ed75c0be62a416559e18493cbd07018e05cc0c27447cde13b5a75e2d0790986fd213e7899ba35d551b0fcbad9ac6616c56bb920e7606d0c