Analysis

  • max time kernel
    178s
  • max time network
    188s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    07-08-2024 22:05

General

  • Target

    dc093865ee838babdd19eb3b3aee9fd41190ba435852578852468168c5c34ac5.apk

  • Size

    3.5MB

  • MD5

    87bc97bed4c81a6bb61b7e4e66fb2472

  • SHA1

    66e13fba7fdcdc22438303013aac431bd2ca91a9

  • SHA256

    dc093865ee838babdd19eb3b3aee9fd41190ba435852578852468168c5c34ac5

  • SHA512

    d15ea1116d763170db92c36c790e97eeaccbc333ed4ac7646fa2a672154c1492d1aea6c236227a589dde115a7d01f6c4a0f00a068a83e4f907547a0943a92351

  • SSDEEP

    49152:Td87VfuXMigdTHvj6BaJ+V//uvJD656grUflhaDH/fQ0v/hNWaWC9jr5nM34ngeS:eteMiIys4mB+6grUfeA2JNzl1nMoWh

Malware Config

Extracted

Family

hook

C2

http://91.92.245.16:3434

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

Processes

  • com.powecenanujo.zipavibo
    1⤵
    • Removes its main activity from the application launcher
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    PID:5006

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.powecenanujo.zipavibo/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.powecenanujo.zipavibo/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    6af953741e7bd7303af3ed4fb060994b

    SHA1

    84fd11596f2566f8fd1e03a4dac70b23b9793b39

    SHA256

    420937f15dfda7c6624cd566dd3c9892f763ed50786e2c7ba78aab3e1cbeb8e0

    SHA512

    eaf41fcf9eb4ceb762319b4c021e30c270139f08a6dea203c84f6688e76c7ad8672398fb7e2d77571d9361406fbfd2c34bff253137d4b6cfe5a9bb3846b7ce36

  • /data/data/com.powecenanujo.zipavibo/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.powecenanujo.zipavibo/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    18cfafa1623b1cb43a754cb397cef920

    SHA1

    5e4d71f63fbac6d4516c2d7a057093b4715ba52c

    SHA256

    950b3c5c50fc44654b62a6c542e990f6ac8e0132072fc33b70774896e3ab7e89

    SHA512

    3adde6c09d720180927761d43601ad346c7ba6dd82afb2fb501d47c24d025972f1cf9ab9cd430d287ef255f12fbc54333f098bca9fc00a51c0323f85f886151e

  • /data/data/com.powecenanujo.zipavibo/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    66d7937038a610b529bb2c6f90f28aa2

    SHA1

    682ab5c48fe1426545e476612ef2e8682cededfc

    SHA256

    702dde02dc1d7e063e00efffbf6897424f7e9b10ecda7229ee96a7f7dc1d722b

    SHA512

    42e816257b648a3b9c47b2902cfc95d9f6446e7d541744c074f7422ad0df82ca6bddde0fdc9c00892d54163850ed62c6e1d792c1f7176a9e94708dd029227430

  • /data/data/com.powecenanujo.zipavibo/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    b8c720c38af6ec445c044bc7ecceeb6d

    SHA1

    764725b8963f16a0bd2f22af1528403f52486e3b

    SHA256

    a51ab18e07cda3f7fda6befa16fc93b322d8e3fd0acaf6b46a175fe247453dbc

    SHA512

    5b4c4e8a47ce1594be436f90dbb7bc4d2d64913880d9964e5f13ed2781e037951774562740dd4cbcf1f5a104a8b00c9f22c6cccc6866a9b9038498d1350e11b7