Analysis

  • max time kernel
    177s
  • max time network
    184s
  • platform
    android_x64
  • resource
    android-x64-20240624-en
  • resource tags

    androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system
  • submitted
    11-08-2024 22:13

General

  • Target

    0cbbdc5616f4a48f38d763317b59d915a5f054d060b9e69924876716e69f620a.apk

  • Size

    4.3MB

  • MD5

    232655bb6d41e37344fdc82ca82ab21c

  • SHA1

    02865a28db7022f621dc39e26f0054d8276ad7bb

  • SHA256

    0cbbdc5616f4a48f38d763317b59d915a5f054d060b9e69924876716e69f620a

  • SHA512

    a12b014596e28fe8250a4eb3c81f41495ea445f867e4a96e539a81a1500fcf2286f766d7fe4a9a43adf5b644d5497a3bae5402a0b98525ff41b5b4c374f639e2

  • SSDEEP

    98304:8IkHWSOSDhANKwdwTpGyVLILF+h9kHy3W7lulKZ6buC39:8IkHW9NJdwfo43kSmww6bP

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs

    Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 5 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.kxgcfoafy.rriydckpr
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Obtains sensitive information copied to the device clipboard
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    • Checks CPU information
    • Checks memory information
    PID:5116

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.kxgcfoafy.rriydckpr/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    0fc16fa09a94af8bb4ea1637b7341f50

    SHA1

    9deec1ceffd986267e843baac23fa2ba66330660

    SHA256

    61ec4668cb5cc0fdf2b89044f0b2b6dc65fca3a18294984ec51d0cbdbac54df7

    SHA512

    c75cf5d569a99469874517a12e95fff8929c096cba6d06c2cc37ccb2c659f56f88b7cdbedd20062bb4853d4ff2a79b9e21caaef394ecbae2c2b83a191e9aebc0

  • /data/data/com.kxgcfoafy.rriydckpr/cache/classes.dex

    Filesize

    1.0MB

    MD5

    0df792f370847ff2219bb7a2921eb06d

    SHA1

    af029e44e802471a924a35d46e5b7161091c2336

    SHA256

    1e840334025f3aaa8e1d10be81d0edb53fa2eeb03333a0f58e65bca5022e643f

    SHA512

    cef0a5694bd1ee05e05995a5b21a24096bc70d6dca3f12b52b0b2c200df4f31c0348df09d03318999ac5179e9501b293abe82575a5a2d6e1a093a3a1a78163c3

  • /data/data/com.kxgcfoafy.rriydckpr/cache/classes.zip

    Filesize

    1.0MB

    MD5

    0b16ec09e090732bbafb54ce541896cb

    SHA1

    3d83ad5fd99248bf71c841e4623ea7f9f4ff8658

    SHA256

    931e4b05f1329f238b60827d0068ec42ce749d4d6199fb2a14847d3cb1487253

    SHA512

    e572e229c3f26cb81beab324608a60db62e7db825c2fc61e84598a417013d5f9143909714e8bad101c0445d3d2eee347d10f72a0531fcc4609da452e08236c2d

  • /data/data/com.kxgcfoafy.rriydckpr/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.kxgcfoafy.rriydckpr/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    93559a173cdda591135a559df498cc8b

    SHA1

    efcbef13f6e71c91f886fa149d8f1f2bd80677d5

    SHA256

    e467d6e6497807d13843a9d46ea06430d7cd79696b2edc08007743b60f9a46d6

    SHA512

    e6e261bbdba82f7b0eeea2e9fcbe12b3ab2ac0132f650e667ee5989668fca8a3828d897cc1e2228dbaf53e752d15a9f1bb8e9c580f9b4954bd2592e975e3e5b6

  • /data/data/com.kxgcfoafy.rriydckpr/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.kxgcfoafy.rriydckpr/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    07ac36cc3ffb34b3bd4151bca309b59c

    SHA1

    aaf2e225fe90a7e312342d66016918a89e7df28e

    SHA256

    eff23290705458f306e180805c8f6b0957589c49c6bb1c9beb2d743b9a30b40e

    SHA512

    f91dee5041e33986f20331f46a22db1bc1f4a0d519bbca9e716dce62882cf013ea16dcbe9f43488c4a95f831a8c52766a12b7350aefca788c2b16f17ee062a59

  • /data/data/com.kxgcfoafy.rriydckpr/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    34a19b6dc41f708ed45b8c94ac4194dd

    SHA1

    0050c7f3e158410e9b55d1ca38b62646cbf927ef

    SHA256

    b9d2e35a4037966f643cb0395e632fc64776fae03b13993d5c8d968ba881926b

    SHA512

    fe39780cb2dd6e181b888769f17b2d367a48e6033e040ebb4bc50a4ab4f054536f6d1555b582ad3113507745c55f1d59e4fa2c07592992cccab825b471d391ab

  • /data/data/com.kxgcfoafy.rriydckpr/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    609ad74a4f301aa6065b54160eb58264

    SHA1

    435cb14b7be6417d002e21ea7888538dd2fd894c

    SHA256

    d069bc644b58501e3012e1dd51d945fce3c08cc290fa4544758f756b2080742e

    SHA512

    2a6f3a69b417ba48ae91a2a1db255d9f116e2a0ef588e4a2c647aeecb5bf5056474ec7d1fdfb8fd36a2088abcb4b5892614dfeb64e55f90ff255064e772033bb