Analysis

  • max time kernel
    179s
  • max time network
    189s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    11-08-2024 22:13

General

  • Target

    c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd.apk

  • Size

    4.3MB

  • MD5

    642bc64883f419e4da9aaec0518ddbe9

  • SHA1

    ffdb3415b3ed61d72c0da68bf792c2fc76b383f3

  • SHA256

    c319c481abe16c06fadbd31895c3239b3d5bbdd5389bfbd1f3fe54d2fa6cb9fd

  • SHA512

    a62e1bfb62ad3ec205c4ed487f3204b2193e8cba1e39d9fcf0f2d3434bc8d4bf4641bced81a7c51cb524ba55e6158da63a9b94d11b3cef20365f99a1b70fed05

  • SSDEEP

    98304:u39MrSRWTOfpcU/lSLMFQSjpio7jKhpqR8N1twQ52irho/Ck:uGrElfphldFQSjpio7jKhpIS3wQwi1cJ

Malware Config

Extracted

Family

hook

C2

http://193.3.19.40

DES_key
AES_key

Signatures

  • Hook

    Hook is an Android malware that is based on Ermac with RAT capabilities.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 3 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 3 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries information about running processes on the device 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about running processes on the device.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs

    Application may abuse the framework's foreground service to continue running in the foreground.

  • Performs UI accessibility actions on behalf of the user 1 TTPs 6 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Reads information about phone network operator. 1 TTPs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Schedules tasks to execute at a specified time 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.

  • Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs

Processes

  • com.tolgfawjd.udvhnorih
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Queries information about running processes on the device
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries information about the current Wi-Fi connection
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Schedules tasks to execute at a specified time
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4324
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tolgfawjd.udvhnorih/app_dex/classes.dex --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.tolgfawjd.udvhnorih/app_dex/oat/x86/classes.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4354

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.tolgfawjd.udvhnorih/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    d7808eb3fb72e10b7452bed09f8819a9

    SHA1

    a40ecee5ff82c8cf7fac18240ecd35e7479a63b6

    SHA256

    5acf2a01f9bf9b77abea6d4660d2b82359ad7662ed8a52ca754255ca03ef84f3

    SHA512

    26027aaef3b04779f887e6b4ffdba5561ae267ad318affe5c1850f44613e5ae39e84cc561c784200de639714c28bfb5690d1dd7d28795e43463883bd10f06e1b

  • /data/data/com.tolgfawjd.udvhnorih/cache/classes.dex

    Filesize

    1.0MB

    MD5

    ffececa77f79db9048f83ce325d9f62b

    SHA1

    c42d2c369b5216f9664950aeeeef319a67afde92

    SHA256

    1274d10aec34c00d1d7e667981e7e462a42f3b04b9af85bff4b742ba9f4dd453

    SHA512

    7f999de898e77b33a0175bc68019f029c4c247409467723444cb3a5ec36b67c0088ded49a477b44b7396f28000dea3d63e986dfa0a23be20ac1c133c4dd3a433

  • /data/data/com.tolgfawjd.udvhnorih/cache/classes.zip

    Filesize

    1.0MB

    MD5

    347804d3d7aacb1170572eddad2af2dd

    SHA1

    0360fc59ea9d5467b0f44cc11f68287f1265a1db

    SHA256

    372cb01ddb9131499e8d179bba1560eaa1e1109f50fbaaf7b281210262b599ec

    SHA512

    fba6766515a22fbf564eda3406ddb52a08e87497f4cf1c42270897fdaf94624c458dcae55337f565f951e4d2c0bb0fa8ef4b03123fc8d9cc715dddff98c0bcd4

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb

    Filesize

    4KB

    MD5

    f2b4b0190b9f384ca885f0c8c9b14700

    SHA1

    934ff2646757b5b6e7f20f6a0aa76c7f995d9361

    SHA256

    0a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514

    SHA512

    ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-journal

    Filesize

    512B

    MD5

    aadedd6fedf57d9abd8f46fd88e95814

    SHA1

    2f9e8f42f5c1afad9dfabae08a767c5ef1fa41ab

    SHA256

    53a204636bcf7951a47e77fde1f695b59bfadd84f0996acf88947968d9095a68

    SHA512

    895bf76a33d92181bab9c8a1f6e93044682110db303866a4f05c10e4961097230bc69554bde64103752386e3781598c10997712a51f148b22060bc584b83ecdb

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    108KB

    MD5

    89d5340e518151b53ac5261f7faa815f

    SHA1

    57c8312bc504da68644cb88e2598d1a29096cfd1

    SHA256

    dd08a43c0f995694aa8a8f570ffe5be0932de8f353a5669dd7789f750c2d8c2f

    SHA512

    ccbbcc1e845e691445cafb79c06721efcbbf3ee81b2b5c83f1eacd0a7f3bf84cee9ff994b1d98e194bb0e9c92cfdd559fcd996e12192b9a861f2d008a889210d

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    173KB

    MD5

    86d670a3fba176058da26f4f8e32b384

    SHA1

    dd1fb657ab6f02c363f3b13f01cfe208fe0f72fd

    SHA256

    d7d78531ed313378ca9607a55c4b390ffb2a06ad98039e4a2f6fcf06f2f6f693

    SHA512

    b66b699d0de515ac49a3798fb0d5be643fa11ecf0140e804832070f9578e3e98de3d86c40cf443529bdcb25dc4d8584bcc3ac303e9175cfa751c6b9707c77188

  • /data/data/com.tolgfawjd.udvhnorih/no_backup/androidx.work.workdb-wal

    Filesize

    16KB

    MD5

    a2c079c56f2a7ebb89eb4c7f73773d7b

    SHA1

    43e29ae436db6172cc744d5f9ae2b87a92be4276

    SHA256

    cf7edff6c1e6e54222912617b668391c8235c903cdf6677ff908bf85ed1342d8

    SHA512

    ff03b1140f22af3f72d68ffb792c122c373b00aab0ac6940cb5f5f0bb1ece22373eeb086077c348fbdad74768f04396431e7472e1b397ed14f0522c31d5a5bc9

  • /data/user/0/com.tolgfawjd.udvhnorih/app_dex/classes.dex

    Filesize

    2.9MB

    MD5

    17bb07bbb8e565167549b5d87b828ab6

    SHA1

    996435e6eb6a78dbd0e774e3f373605b306d2ba8

    SHA256

    f65d5e53228e9bca461eab35b9bbeae1adfaedd17fb0f8303f930469f8bfed6e

    SHA512

    51ccdaf78f9a9d1373f22f7ada238057edafb8c2302f4c1fcf41d621db0853d9054dec41ab016fa6f9b5b52c8e9613883ba0b6bde0bee4b755d0bd7e80652214