Analysis

  • max time kernel
    171s
  • max time network
    190s
  • platform
    android_x64
  • resource
    android-x64-arm64-20240624-en
  • resource tags

    androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system
  • submitted
    10-08-2024 22:00

General

  • Target

    a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d.apk

  • Size

    4.2MB

  • MD5

    8aa230b892f1150bb4e173deef6260ff

  • SHA1

    ecb3cf2a93e636b149797bdda7120c0e65535ef0

  • SHA256

    a6e64732fa01766a0c9b6623983e82c3d70d5313810222ec84d5aab66047289d

  • SHA512

    5255d16f4f186436b497bbbb05bdd8967d4824b1bcbd07e8ce1b1e4cbafb3ad7ad410f1e0a7a973a216cc4ca42c8b4c8287adc9d3dea8959c353e091752fee36

  • SSDEEP

    98304:grmuGdyETMnUUxf+W6EDnOHL6zylQPra5qzbMfKSnKzdLyDqwS:grmXT+UEfI8n9ylxqzYf3nKztytS

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.eujazsdut.relpsbcqm
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:4449

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.eujazsdut.relpsbcqm/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    a3252c3c251b196b76f84852b71f7a96

    SHA1

    737e2ab0ee6f37b6f316721fe42dd76596a24316

    SHA256

    bf2a22961079445736b92970a266a0bb975c1277ecd4acb73fc6362075fc8a84

    SHA512

    2b71355165b64acc701f4b0e9c5c2cfd61c5e6386ccaa39422feaa45838a65a53cdcbf62d2881fdddf79b9156ea1b0b9145ef905890cd768c34881ac7116ff95

  • /data/data/com.eujazsdut.relpsbcqm/cache/classes.dex

    Filesize

    1.0MB

    MD5

    6a3e8d794059dc6135618dc1e349b24b

    SHA1

    70c62e7fae8c9beb008375eee4b2343f84f31c0a

    SHA256

    10914c2481ea14767faad749b8c27e4ebe9a6cf7fc75f796ea1468e81e9b29de

    SHA512

    504d2fa8bd8e942aa261fc9a4d4dbe2af57622dc9304f664c85415ff4adf972da6a6ec76bed91fbad443330945bcdce52a3ca2c321d43c09323fae3b37fc1682

  • /data/data/com.eujazsdut.relpsbcqm/cache/classes.zip

    Filesize

    1.0MB

    MD5

    c6616a73447fce11b1d9c98bc123fb21

    SHA1

    e182aa041493b5078c225e72aaa6960aec65c003

    SHA256

    af4da0c703d754964f5cb4400e293d710ce1acb99bfe528979d29565afcad9b5

    SHA512

    92a473752b841e06a4e2159d82b556ee113192fe7e83f950de390a28c44b25ef3ee3fb0644dedf189b523474a66cceaa30fea7b226c0e7fd4bd7ba0af616d322

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    7e858c4054eb00fcddc653a04e5cd1c6

    SHA1

    2e056bf31a8d78df136f02a62afeeca77f4faccf

    SHA256

    9010186c5c083155a45673017d1e31c2a178e63cc15a57bbffde4d1956a23dad

    SHA512

    d0c7a120940c8e637d5566ef179d01eff88a2c2650afda69ad2a46aad76533eaace192028bba3d60407b4e34a950e7560f95d9f9b8eebe361ef62897d88b30cb

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    12a74d74234397ade17e85df3e7e8d51

    SHA1

    87ec5fb2ca5a7a320ed90ef0a56ea56e5d0f859b

    SHA256

    d4f3e0e4aad461eb431801cd89434421778d86bfd56063cb8b07f69ca9a5dcce

    SHA512

    27fa982e80e3a40d334656d2eb93e06537399597e1f6f1fcd61d6db6bfec7fc398b87772c8d90b6e89cdead0aeea2b8d0c2c884f9775b2628610a67e35e052c4

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    3d09e251b615f79f86a8ea5a39e28a1a

    SHA1

    062903309e9095d6126b6de34484200e2a1bc722

    SHA256

    df4e70ad92d6d6eb9cd2a73cd1256e295bc261207476c552d28f38fb0e7c6701

    SHA512

    8168befc819243c296b2a36323c4909923a57f3af31b1afd7c2568bcc8512041a3a821bb4e5360436c9ac26e9265c8f4987589b169bca5f9950180698630ee2a

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    8232cf5800aa27b75855e60183c957a6

    SHA1

    0c7a2b8e337edef54bc86f2b26032ac690eafc60

    SHA256

    534800d5cd03ab621d44aa28594849094810403bdd56c627bdd0171ad7b5631b

    SHA512

    ab669373ab5a0b669a57c3ae10193f916465cdb6eb80ded284c2cb86f54337373abc58ac1069b5b9f011ff36f763fd1ffb9b21a6e9c1ced442b46999e26fdd07

  • /data/data/com.eujazsdut.relpsbcqm/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    f35eeb48db439363fd4baa3241f91648

    SHA1

    405e08fadea4a2e2f034453c3fc2afdaf40eb576

    SHA256

    efbb8a24ddf23dac3b2bb8d617181e2b4144dd9506fa520ce2da010fb6db343b

    SHA512

    36c89684e76e4cd3112337c842ab8319a60c6dc64f6f01f625fea7cbc4abbeb065338e7283065871b857630f8f18c458371500f1aabfde5eb6a4ac73841e4348