Analysis

  • max time kernel
    178s
  • max time network
    191s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    08-08-2024 22:00

General

  • Target

    66e08e61b9baa4b5a1a2801ed3066b12295ef56b83e167f59a8a069a11c4bd58.apk

  • Size

    4.2MB

  • MD5

    683e628f184379a1c0f22abc4c4fd86b

  • SHA1

    2c30d9b6edc5100630009f06d68b606709374657

  • SHA256

    66e08e61b9baa4b5a1a2801ed3066b12295ef56b83e167f59a8a069a11c4bd58

  • SHA512

    f6b05d35e12be23b764dceae38350d45e6c8bc5718df6fe87c9bcc4ad371c4c384a2d000a2347036362de7c3e8dc019d7958fb6f01f77047318ca007d4f76942

  • SSDEEP

    98304:WxeQB+vp1LDCiKVwYkOjQZjNJNIcKfEDhD9QTTtb6d5vsFt/dY4:qeQ4h1LDjYkOjQ7fIWDJ9QNudeZ

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 9 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Requests accessing notifications (often used to intercept notifications before users become aware). 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.rjzenjmum.vtuudohsv
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4261
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rjzenjmum.vtuudohsv/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=43 --oat-location=/data/user/0/com.rjzenjmum.vtuudohsv/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4290

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.rjzenjmum.vtuudohsv/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    eef9bed788e6f70f3ca4a7308d06ac41

    SHA1

    50314a8fbf789ed20dd8284313b4e6fea2a0a6c9

    SHA256

    1aac11a002c38dc426e66b58104798814a8a174e57b1b4906e95f4d9225dcb5d

    SHA512

    4dcf0e0a336ed66d90c2e803a458146f1c712f350511a39c4bf8f6d9785a41a856610f3833c2d67c7c8906857f727a4e0fdcfe7fc84de272f4fe782b9041f8cb

  • /data/data/com.rjzenjmum.vtuudohsv/cache/classes.dex

    Filesize

    1.0MB

    MD5

    c648085afe810e07df71584f7e1771cd

    SHA1

    ca616e8c479f0cf54dc9eca9a16a1d9691120fd8

    SHA256

    476bceaa67be558213a9d0a77c2211988020ba064c6fde52264d76fcb84aaca2

    SHA512

    9d9051a8bd0198323fa8c2315252eabb01a38b7bb7da2893144ff9abc1988fad43a69927a76ec6c6c68bb509ed65ff03b260b2edd2b207a07c8c60fb2bdd97e8

  • /data/data/com.rjzenjmum.vtuudohsv/cache/classes.zip

    Filesize

    1.0MB

    MD5

    ddce10d1722f7e9e7e3c8fcf78ba656f

    SHA1

    5ad211a0ac230b386234bab1e2faee5230c6fca9

    SHA256

    0250da3289aa1bfbef5856da4ff2656e2a727d178ec86533fa0df2655924b2ac

    SHA512

    580f9fa5272516160dfd70c855983f13248127052f48dd146d9ddf7889eea6a0316828568a04c90df3aaf28d4a395fffa4cd2420293cd6c84adf3f6762983d83

  • /data/data/com.rjzenjmum.vtuudohsv/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.rjzenjmum.vtuudohsv/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    fd3632ebaeeacc90cbe524962846f97c

    SHA1

    aa7b36094e0d962c227b7d15e35a38c5b2e1f37d

    SHA256

    73ab3a9c42b9e5843c2f2a1691f6b87ea91735806bab5dd16671d54f0c7b7acc

    SHA512

    d6b839657a09a4838ad61961e901abe58a79407830df474ae2b6bde190d77ec1062ba836627efb57d56cd6e70f2cb0b71bae3b5685323cd361480c8a2695ebb2

  • /data/data/com.rjzenjmum.vtuudohsv/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.rjzenjmum.vtuudohsv/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    f833b7fe98b30f8a646aa7d13b3d9c36

    SHA1

    8b9545a8271500f5fcef2adb1936db8a61268bdb

    SHA256

    1c0609296d5f483b2e38843fc6c3748c59f7b0cf8c50443b2ad1001720dcef81

    SHA512

    08b47e16f52e3ce5082e284806e6bb93d028f4197be1a36110365f608a0fec026a01e88e652566e8cbfcc7384caf188fd91db333f867aa1ac90b12da520feda4

  • /data/data/com.rjzenjmum.vtuudohsv/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    5b433d339d9859d1168884458a236b65

    SHA1

    c651bcb327e6f51aea74d3f2c5fccebbe7bd0769

    SHA256

    28e5aa88e3c9bd6243c121a998f025036a7554fba05722c6cd03fe762b1c398f

    SHA512

    84133afba40531268b9cdf37bb33c493296204a047b268fca8b2e858d73c8138af3e89c18234787b9ee615043938873f138ba5058a9c83a2fd1203626d2768a5

  • /data/data/com.rjzenjmum.vtuudohsv/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    8f22d5fe40156206782334755241ce2e

    SHA1

    10d65b1893faad815f8a7a86ba2ce89171af2a41

    SHA256

    97d23c8cf77c742e246f749afac2f8db24c1bdc59a4d5a9ac58122ed7948b406

    SHA512

    325f40cdeb6e906f56171525f053100fd97719aaf581b0a4bc942984000ee76bf2a94688095a69457fcbc077275a3f1c1db83fbe2cf7a901edb0d6cf6ef65a2c

  • /data/user/0/com.rjzenjmum.vtuudohsv/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    0a6e37fac8005f45fc47e261e31fa7fc

    SHA1

    03f3aee72f061616c0a24c7ae7c5a3cf6de7ed4d

    SHA256

    9ce742d941e6f62c69265d18b023e1d7eb556c2cbde31f7e184e7137e1052cf2

    SHA512

    dbdad170eaa56a4e76b0cfff35962fced534f7c420e1311aa1f080c19bb4be77f634f85f431574a72b987363b1ba565973fed9ddd12c37959be78c20d045c22d