Analysis

  • max time kernel
    171s
  • max time network
    183s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    10-08-2024 22:00

General

  • Target

    a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d.apk

  • Size

    4.2MB

  • MD5

    8aa230b892f1150bb4e173deef6260ff

  • SHA1

    ecb3cf2a93e636b149797bdda7120c0e65535ef0

  • SHA256

    a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d

  • SHA512

    5255d16f4f186436b497bbbb05bdd8967d4824b1bcbd07e8ce1b1e4cbafb3ad7ad410f1e0a7a973a216cc4ca42c8b4c8287adc9d3dea8959c353e091752fee36

  • SSDEEP

    98304:grmuGdyETMnUUxf+W6EDnOHL6zylQPra5qzbMfKSnKzdLyDqwS:grmXT+UEfI8n9ylxqzYf3nKztytS

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.eujazsdut.relpsbcqm
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5058

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.eujazsdut.relpsbcqm/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    a3252c3c251b196b76f84852b71f7a96

    SHA1

    737e2ab0ee6f37b6f316721fe42dd76596a24316

    SHA256

    bf2a22961079445736b92970a266a0bb975c1277ecd4acb73fc6362075fc8a84

    SHA512

    2b71355165b64acc701f4b0e9c5c2cfd61c5e6386ccaa39422feaa45838a65a53cdcbf62d2881fdddf79b9156ea1b0b9145ef905890cd768c34881ac7116ff95

  • /data/data/com.eujazsdut.relpsbcqm/cache/classes.dex

    Filesize

    1.0MB

    MD5

    6a3e8d794059dc6135618dc1e349b24b

    SHA1

    70c62e7fae8c9beb008375eee4b2343f84f31c0a

    SHA256

    10914c2481ea14767faad749b8c27e4ebe9a6cf7fc75f796ea1468e81e9b29de

    SHA512

    504d2fa8bd8e942aa261fc9a4d4dbe2af57622dc9304f664c85415ff4adf972da6a6ec76bed91fbad443330945bcdce52a3ca2c321d43c09323fae3b37fc1682

  • /data/data/com.eujazsdut.relpsbcqm/cache/classes.zip

    Filesize

    1.0MB

    MD5

    c6616a73447fce11b1d9c98bc123fb21

    SHA1

    e182aa041493b5078c225e72aaa6960aec65c003

    SHA256

    af4da0c703d754964f5cb4400e293d710ce1acb99bfe528979d29565afcad9b5

    SHA512

    92a473752b841e06a4e2159d82b556ee113192fe7e83f950de390a28c44b25ef3ee3fb0644dedf189b523474a66cceaa30fea7b226c0e7fd4bd7ba0af616d322

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    27bacb22ef8d10dc5d23bc413b377ae4

    SHA1

    0fdeb77c27f2ce8aada9aaf7b95b4c7be7c73778

    SHA256

    0ec7c18132e5eae44ea5e30a913ca1ee21aa68afdfc3a24676c95214895cc11a

    SHA512

    270ee36e62dbaddc463b0a6b3ba94e1daf584abf9e06ac69f6209354c86fbd65ea69187de40eb56eff1bccb41a179ba0ed370b2701448c62deb4e4a77fca16c3

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    2d806c8c66024908c7e1caf3c3e56f69

    SHA1

    0f43fd42b47cf9254fccc1a2b2f7e4ddf06224cc

    SHA256

    68605dafd5b02c5ec7125cf07613ba1e72c83f12bb55a965ecb44ddf903734b1

    SHA512

    1df992d8e18e827012c201eebf0f984d110edafdd31e786566b95bc706a2004398db9648d15734f0f39e2095fdc096049764433cca975b7160d3e2396f591275

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    ed24c0b2b7cbfaccfa79808fcac51247

    SHA1

    d4b227a9250af56d2e47cd796b02b532117faacd

    SHA256

    7d1574e8063b906c126cbe15b7d907800570d2ada8136acfdbaaec2f7c9cf377

    SHA512

    a681ca1820a49bb727c1178b9d56caf2a4e9307a3f3222632d0c04b4d3435abeb3e90504afd3ac9d096adf8e46dfdf79aaab99f542d1f070f8253792fe6c3b12

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    bd569b91b61f12196f08ff4e263ab8b3

    SHA1

    7959dcab415ed1cde5528c86f7aaeb29614f447b

    SHA256

    50edad28bab6903386fe1065a1d3e04551a7e8101fb81903558d36d21f96e00d

    SHA512

    e2b4db88fbf0b3f7b0eaa775b9832f0f7c274d9abd1a7383f57b39ebb726222c8e2f38bba2850ca4b1b0c4755506b13899bcb1071326e126b327cd16b5dc35b7