Analysis

  • max time kernel
    163s
  • max time network
    200s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    06-08-2024 22:01

General

  • Target

    5483fa7885bfd9810be6b7d4a49f7e0faf88568cc3d639fdcb45eeba2b2ec6a1.apk

  • Size

    4.3MB

  • MD5

    ab0823e2a1af26215fcf6ab4b6f5f321

  • SHA1

    322b524b0c61041eb4236384dd3ce617e894b88f

  • SHA256

    5483fa7885bfd9810be6b7d4a49f7e0faf88568cc3d639fdcb45eeba2b2ec6a1

  • SHA512

    d8a4bede4fd052914f7c38b2401272e8e917cad43db44e49ec44dee7bc8973ef207897d077c969d4eec92f42c6d6cb2949089f9ed6d6ae933a2ee959e5c3905b

  • SSDEEP

    98304:HIhrZM+goR6oYA+Ozhr/45MW7rc+jFMKrvPeE3+SoouH:ohrZMSRf//iPFHPBOSPuH

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.mcaamhgue.nsnnrtmey
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4535

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.mcaamhgue.nsnnrtmey/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    770d00dfd76aa819f75fa55b30f0fdbb

    SHA1

    cda6625bf7e4ac5368e6035bbe1286c69266c4bc

    SHA256

    9a0dfcb6f33c5fa91c91cc66fc342db5b4c1c7d8da0248500927114ac09aa608

    SHA512

    2abfb6b5deb3abcbcb619ab042d71d135460e7eb123822a2f0cd2f44c786338fb76653d907d18afdf87420fa9510ea5930dc0f5131b50a539cca0cf617b93638

  • /data/data/com.mcaamhgue.nsnnrtmey/cache/classes.dex

    Filesize

    1.0MB

    MD5

    2e0bf59467ab7bae6df8cc299e9de4aa

    SHA1

    f0f610c4b5e02fdeab2a3e6e2c95572daebbb6ab

    SHA256

    6f7fd23b7cfb8f35e8a6fb11fb0bc953bbe7e2b933c7a3427cd133c76f6d7e0a

    SHA512

    d51debfd0deab5c9eb32935f446d2ab0e05b09d7a426f058188c68ba89a7179cd4a3dfed26a5bea278866bf2f1b0ec61e923df1a5879007c553d266751c17dc5

  • /data/data/com.mcaamhgue.nsnnrtmey/cache/classes.zip

    Filesize

    1.0MB

    MD5

    fc32d987479c5043fe713bfc73c0b6a6

    SHA1

    9bce84125a7f816d3467081e3ce57b75d8a7e6bf

    SHA256

    361af81c62a7a435f136e88d586175163d5e0590a7435fa2f8ed1694e8f866d9

    SHA512

    a1c3662c2c4c542a4fdace66a6a8f08bc5ca9da9ed602709301cbd271011dbf25dc1241578d6f298b619d0f856529ab98b4b373f804f409dfa3a5528357d23a7

  • /data/data/com.mcaamhgue.nsnnrtmey/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.mcaamhgue.nsnnrtmey/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    dc4db4d0e85226b33733476ccd5738aa

    SHA1

    2035dc07adb565525b71d81f32d838baef7da86e

    SHA256

    fc641b79ca9e96a89433db2762c3ed456e299312b60099e402aca2bdd9411801

    SHA512

    9721b10f0974cf3dccbfa8993a0777dc2a8d60ca8558620ac06803db84b3a90a39a4d7b728700f629fbe75cd8fc231d84d7a72cfb63aba6620224ea5ccd24dc1

  • /data/data/com.mcaamhgue.nsnnrtmey/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.mcaamhgue.nsnnrtmey/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    54448508be7bb37e363f5d5df7cb5013

    SHA1

    2d1dcf2357d42870cf4e1d222054ada2446ecaf3

    SHA256

    061ca113a8c3092d98517a98f23373674e3327992dcb8bb7ce89b1c97ae3fcdd

    SHA512

    2d22a59436d6689a928501d8a72e2655741df31c309ab1d589a4b9fe5e2e1ebd0ff534d7ad9acd1d3b2e73906cd070117f1bfd13bc2e42fa6e802d8a274319c1

  • /data/data/com.mcaamhgue.nsnnrtmey/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    23fb844f78550e8373d97b1cbe2813da

    SHA1

    eec7719700cc1a25825b2c4131a859e9496d84ff

    SHA256

    011a382baf45b701789c551aa68c3cf2dc4cce739d5a5d8abc6898cf3ba900b4

    SHA512

    18b0d43b6c13bccad31f5d0e65a7366a2ac9c0d3a90d9bcc5fa769313d9bc27d759b1825c51cdfd1cb3e198e0caef1cbf78ba5671873ffe42ff7f864f55a2326

  • /data/data/com.mcaamhgue.nsnnrtmey/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    c61b04b4d20d3af6cff6df55c87f14e6

    SHA1

    c30d79168ac3cacee9eaf9c1775696af4248b552

    SHA256

    8f821c3c05c9e37628a3ae08aa4f0491a7e871a94351d358c206c496e9ebfb07

    SHA512

    2db84c9911e19354defc8e2fb4a5635c33de61189cee9622394ca0f3d1903a08a7296783d8d3afc4e388421ff725cc1999af05c2e37513294bc95fbe4fa1386a